Computing

Papers
(The TQCC of Computing is 7. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Multi-input CNN-GRU based human activity recognition using wearable sensors199
Customer churn prediction system: a machine learning approach101
Future directions for chatbot research: an interdisciplinary research agenda74
A modified DeepWalk method for link prediction in attributed social network65
Smart COVID-shield: an IoT driven reliable and automated prototype model for COVID-19 symptoms tracking61
Edge computing: current trends, research challenges and future directions49
Nature inspired meta heuristic algorithms for optimization problems48
An improved YOLO-based road traffic monitoring system46
Energy-makespan optimization of workflow scheduling in fog–cloud computing40
A hybrid machine learning model for intrusion detection in VANET39
A multi-objective load balancing algorithm for virtual machine placement in cloud data centers based on machine learning38
Enhanced Harris Hawks optimization as a feature selection for the prediction of student performance36
An energy-aware clustering and two-level routing method in wireless sensor networks35
AI-enabled remote monitoring of vital signs for COVID-19: methods, prospects and challenges34
An optimized feature selection using bio-geography optimization technique for human walking activities recognition33
An optimization scheme for IoT based smart greenhouse climate control with efficient energy consumption33
EELRP: energy efficient layered routing protocol in wireless sensor networks32
A novel blockchain based framework to secure IoT-LLNs against routing attacks32
A survey on meta-heuristic algorithms for the influence maximization problem in the social networks30
VLDNet: Vision-based lane region detection network for intelligent vehicle system using semantic segmentation28
An improved list-based task scheduling algorithm for fog computing environment25
Air pollution prediction based on factory-aware attentional LSTM neural network25
Ubiquitous Health Profile (UHPr): a big data curation platform for supporting health data interoperability25
Trust-driven reinforcement selection strategy for federated learning on IoT devices24
A scheme for intelligent blockchain-based manufacturing industry supply chain management24
Efficient federated learning for fault diagnosis in industrial cloud-edge computing23
Combined oversampling and undersampling method based on slow-start algorithm for imbalanced network traffic23
LSTM based link quality confidence interval boundary prediction for wireless communication in smart grid23
Bearing fault diagnosis based on improved federated learning algorithm23
Feature selection and evaluation for software usability model using modified moth-flame optimization23
IoT-cloud based healthcare model for COVID-19 detection: an enhanced k-Nearest Neighbour classifier based approach22
K-predictions based data reduction approach in WSN for smart agriculture22
Quality of service provisioning in network function virtualization: a survey21
An overview of queuing delay and various delay based algorithms in networks21
VNE solution for network differentiated QoS and security requirements: from the perspective of deep reinforcement learning21
Strategy-proof mechanism for online resource allocation in cloud and edge collaboration21
Optimal rendezvous points selection to reliably acquire data from wireless sensor networks using mobile sink21
Dynamic resource allocation in cloud computing: analysis and taxonomies20
Adaptive ensembles of autoencoders for unsupervised IoT network intrusion detection20
Notions of architecture in fog computing20
The greedy coupled-seeds expansion method for the overlapping community detection in social networks20
On opportunistic software reuse19
GPU-based matrix-free finite element solver exploiting symmetry of elemental matrices19
Towards 5G-based IoT security analysis against Vo5G eavesdropping19
An IoT-enabled smart health care system for screening of COVID-19 with multi layers features fusion and selection19
A framework for Model-Driven Engineering of resilient software-controlled systems18
Optimized SAT encoding of conformance checking artefacts18
Improving healthcare services using source anonymous scheme with privacy preserving distributed healthcare data collection and mining16
Evaluation of fog application placement algorithms: a survey16
Energy-efficient approach to lower the carbon emissions of data centers16
Bio-signal data sharing security through watermarking: a technical survey16
Wireless sensor networks: a survey, categorization, main issues, and future orientations for clustering protocols15
IoT streaming data integration from multiple sources15
A multi-attribute decision making approach for on-demand charging scheduling in wireless rechargeable sensor networks15
Virtual machine migration policy for multi-tier application in cloud computing based on Q-learning algorithm15
A Prior-mask-guided Few-shot Learning for Skin Lesion Segmentation15
Allocation of applications to Fog resources via semantic clustering techniques: with scenarios from intelligent transportation systems14
MDER: modified degree with exclusion ratio algorithm for influence maximisation in social networks14
Anomaly detection in cloud environment using artificial intelligence techniques14
Prediction of link evolution using community detection in social network14
Trust on wheels: Towards secure and resource efficient IoV networks14
Fuzzy logic-based VANET routing method to increase the QoS by considering the dynamic nature of vehicles14
An intelligent healthcare system for predicting and preventing dengue virus infection14
An overview of data reduction solutions at the edge of IoT systems: a systematic mapping of the literature13
Machine learning-based IoT system for COVID-19 epidemics13
Jointly Optimizing Offloading Decision and Bandwidth Allocation with Energy Constraint in Mobile Edge Computing Environment13
An interdisciplinary approach on efficient virtual microgrid to virtual microgrid energy balancing incorporating data preprocessing techniques13
An efficient gray system theory-based routing protocol for energy consumption management in the Internet of Things using fog and cloud computing13
An ECC-based lightweight remote user authentication and key management scheme for IoT communication in context of fog computing12
Time series-based workload prediction using the statistical hybrid model for the cloud environment12
Edge computing12
Coupling multifunction drones with AI in the fight against the coronavirus pandemic12
Machine learning approaches to network intrusion detection for contemporary internet traffic12
Lightweight edge authentication for software defined networks12
Scalable blockchain storage systems: research progress and models12
Road surface type classification based on inertial sensors and machine learning12
Combined use of coral reefs optimization and reinforcement learning for improving resource utilization and load balancing in cloud environments12
The evolution of distributed computing systems: from fundamental to new frontiers11
A weighted K-member clustering algorithm for K-anonymization11
Efficient offloading schemes using Markovian models: a literature review11
A systematic mapping study on automated analysis of privacy policies11
A novel ECC-based provably secure and privacy-preserving multi-factor authentication protocol for cloud computing11
Blockchain-based secure multi-resource trading model for smart marketplace11
Heterogeneous self-tracked health and fitness data integration and sharing according to a linked open data approach11
An approach to dynamically assigning cloud resource considering user demand and benefit of cloud platform11
Improved label propagation algorithm for overlapping community detection10
Performance and availability evaluation of an smart hospital architecture10
The impact of biased sampling of event logs on the performance of process discovery10
Secure FaaS orchestration in the fog: how far are we?10
A hierarchical formal method for performance evaluation of WSNs protocol10
QoS evaluation model based on intelligent fuzzy system for vehicular ad hoc networks10
Detector-based component model abstraction for microservice-based systems10
IoT-enabled stacked ensemble of deep neural networks for the diagnosis of COVID-19 using chest CT scans9
Multi-objective optimization for VM placement in homogeneous and heterogeneous cloud service provider data centers9
Implementation of an energy saving cloud infrastructure with virtual machine power usage monitoring and live migration on OpenStack9
A self-learning bee colony and genetic algorithm hybrid for cloud manufacturing services9
Task scheduling in edge-fog-cloud architecture: a multi-objective load balancing approach using reinforcement learning algorithm9
Fog-based architecture for scheduling multiple workflows with high availability requirement9
An approach to evaluate trust and reputation of things in a Multi-IoTs scenario9
A prediction-based model for virtual machine live migration monitoring in a cloud datacenter9
Context-aware recommender system using trust network9
Improved approaches for density-based outlier detection in wireless sensor networks8
Special issue on intelligent Edge, Fog, Cloud and Internet of Things (IoT)-based services8
An improved firefly algorithm based on personalized step strategy8
Realizing self-adaptive systems via online reinforcement learning and feature-model-guided exploration8
Novel self-adjusted particle swarm optimization algorithm for feature selection8
A job scheduling algorithm based on rock hyrax optimization in cloud computing8
Users opinion and emotion understanding in social media regarding COVID-19 vaccine8
Rumor detection based on a Source-Replies conversation Tree Convolutional Neural Net8
Internet network location privacy protection with multi-access edge computing8
Energy generation forecasting: elevating performance with machine and deep learning8
Prediction based task scheduling approach for floodplain application in cloud environment8
Sensor network sensing coverage optimization with improved artificial bee colony algorithm using teaching strategy8
Morse glasses: an IoT communication system based on Morse code for users with speech impairments8
HATMOG: an enhanced hybrid task assignment algorithm based on AHP-TOPSIS and multi-objective genetic in cloud computing7
AwARE: a framework for adaptive recommendation of educational resources7
A novel indoor localization system using machine learning based on bluetooth low energy with cloud computing7
A scalable blockchain network model with transmission paths and neighbor node subareas7
Towards big services: a synergy between service computing and parallel programming7
Enhanced hybrid multi-objective workflow scheduling approach based artificial bee colony in cloud computing7
HPMaX: heterogeneous parallel matrix multiplication using CPUs and GPUs7
Artificial intelligence to automate the systematic review of scientific literature7
RNe2Vec: information diffusion popularity prediction based on repost network embedding7
The impact of copycat attack on RPL based 6LoWPAN networks in Internet of Things7
Machine learning driven intelligent and self adaptive system for traffic management in smart cities7
IEEE 802.15.4 historical revolution versions: A survey7
A conceptual framework for resilience: fundamental definitions, strategies and metrics7
SADM-SDNC: security anomaly detection and mitigation in software-defined networking using C-support vector classification7
A data fusion based data aggregation and sensing technique for fault detection in wireless sensor networks7
Dynamic workload-aware DVFS for multicore systems using machine learning7
Emerging applications of internet of things, big data, security, and complexity: special issue on collaboration opportunity for IoTBDS and COMPLEXIS7
Exploring and optimizing partitioning of large designs for multi-FPGA based prototyping platforms7
1.9721758365631