Journal of Supercomputing

Papers
(The median citation count of Journal of Supercomputing is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Dung beetle optimizer: a new meta-heuristic algorithm for global optimization124
AI-based smart prediction of clinical disease using random forest classifier and Naive Bayes114
The DDoS attacks detection through machine learning and statistical methods in SDN94
Smart healthcare in smart cities: wireless patient monitoring system using IoT85
A novel LSTM–CNN–grid search-based deep neural network for sentiment analysis85
An AI-based intelligent system for healthcare analysis using Ridge-Adaline Stochastic Gradient Descent Classifier81
Smart home security: challenges, issues and solutions at different IoT layers78
A lightweight remote user authentication scheme for IoT communication using elliptic curve cryptography78
An optimized hybrid deep learning model using ensemble learning approach for human walking activities recognition77
Amended hybrid multi-verse optimizer with genetic algorithm for solving task scheduling problem in cloud computing74
DeepFakE: improving fake news detection using tensor decomposition-based deep neural network74
A systematic literature review on hardware implementation of artificial intelligence algorithms69
Towards design and implementation of security and privacy framework for Internet of Medical Things (IoMT) by leveraging blockchain and IPFS technology68
A survey on computation offloading and service placement in fog computing-based IoT67
Construction and verification of retinal vessel segmentation algorithm for color fundus image under BP neural network model64
Classification of brain tumors from MR images using deep transfer learning62
Suspicious activity detection using deep learning in secure assisted living IoT environments61
Network intrusion detection using multi-architectural modular deep neural network58
A hybrid OBL-based firefly algorithm with symbiotic organisms search algorithm for solving continuous optimization problems58
Task scheduling, resource provisioning, and load balancing on scientific workflows using parallel SARSA reinforcement learning agents and genetic algorithm57
Performance evaluation of edge-computing platforms for the prediction of low temperatures in agriculture using deep learning57
An efficient resource provisioning approach for analyzing cloud workloads: a metaheuristic-based clustering approach51
KCSS: Kubernetes container scheduling strategy49
Investigating the performance of Hadoop and Spark platforms on machine learning algorithms47
The design and implementation of a robust single-layer QCA ALU using a novel fault-tolerant three-input majority gate46
Energy-efficient cluster head selection through relay approach for WSN45
An improved anomaly detection model for IoT security using decision tree and gradient boosting45
A systematic study of load balancing approaches in the fog computing environment45
Efficient data aggregation with node clustering and extreme learning machine for WSN44
Using deep belief network to construct the agricultural information system based on Internet of Things43
A new and fast rival genetic algorithm for feature selection43
A multiple multilayer perceptron neural network with an adaptive learning algorithm for thyroid disease diagnosis in the internet of medical things42
Decentralized task allocation for heterogeneous multi-UAV system with task coupling constraints42
Load balancing in cloud computing environment using the Grey wolf optimization algorithm based on the reliability: performance evaluation42
DNetUnet: a semi-supervised CNN of medical image segmentation for super-computing AI service42
A lightweight solution to epileptic seizure prediction based on EEG synchronization measurement41
An efficient binary chaotic symbiotic organisms search algorithm approaches for feature selection problems41
A new deep convolutional neural network model for classifying breast cancer histopathological images and the hyperparameter optimisation of the proposed model40
An intelligent internet of things-based secure healthcare framework using blockchain technology with an optimal deep learning model38
Gait recognition for person re-identification38
A symbiosis of arithmetic optimizer with slime mould algorithm for improving global optimization and conventional design problem37
A secure blockchain-based group key agreement protocol for IoT37
Automatic detection of depression symptoms in twitter using multimodal analysis36
cTMvSDN: improving resource management using combination of Markov-process and TDMA in software-defined networking35
G-TOPSIS: a cloud service selection framework using Gaussian TOPSIS for rank reversal problem34
K-DBSCAN: An improved DBSCAN algorithm for big data34
Elite learning Harris hawks optimizer for multi-objective task scheduling in cloud computing34
DV-Hop-based range-free localization algorithm for wireless sensor network using runner-root optimization33
A collaborative filtering recommendation system with dynamic time decay33
A dynamic VM consolidation approach based on load balancing using Pearson correlation in cloud computing33
Secure communication between UAVs using a method based on smart agents in unmanned aerial vehicles33
A systematic survey of data mining and big data analysis in internet of things32
A new hybrid algorithm for path planning of mobile robot32
CMODLB: an efficient load balancing approach in cloud computing environment31
Towards sustainable smart IoT applications architectural elements and design: opportunities, challenges, and open directions30
A Spark-based Apriori algorithm with reduced shuffle overhead30
A bi-objective task scheduling approach in fog computing using hybrid fireworks algorithm30
Automated segmentation of leukocyte from hematological images—a study using various CNN schemes30
Comprehensive survey on energy-aware server consolidation techniques in cloud computing30
A bio-inspired privacy-preserving framework for healthcare systems29
Research on navigation of bidirectional A* algorithm based on ant colony algorithm29
A blockchain-based intelligent anti-switch package in tracing logistics system29
Blockchain-based solutions for security, privacy, and trust management in vehicular networks: a survey29
Feature engineering and deep learning-based intrusion detection framework for securing edge IoT29
Localization of sensor nodes in wireless sensor networks using bat optimization algorithm with enhanced exploration and exploitation characteristics29
Stock exchange trading optimization algorithm: a human-inspired method for global optimization29
Load balancing of IoT tasks in the cloud computing by using sparrow search algorithm29
Bidirectional LSTM-RNN-based hybrid deep learning frameworks for univariate time series classification28
An end-to-end deep learning model for human activity recognition from highly sparse body sensor data in Internet of Medical Things environment28
An intelligent fault detection approach based on reinforcement learning system in wireless sensor network27
Containerization technologies: taxonomies, applications and challenges27
Mid-term electricity load prediction using CNN and Bi-LSTM27
Designing nanotechnology QCA–multiplexer using majority function-based NAND for quantum computing26
Deep learning and case-based reasoning for predictive and adaptive traffic emergency management26
Deep neural network-based fusion model for emotion recognition using visual data26
A unit-based, cost-efficient scheduler for heterogeneous Hadoop systems26
A novel transfer learning approach for the classification of histological images of colorectal cancer26
Security explorations for routing attacks in low power networks on internet of things26
Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection26
An improved DQN path planning algorithm25
Discrete Jaya with refraction learning and three mutation methods for the permutation flow shop scheduling problem25
A convolutional autoencoder-based approach with batch normalization for energy disaggregation25
A review on diagnostic autism spectrum disorder approaches based on the Internet of Things and Machine Learning25
Intelligent monitor for typhoon in IoT system of smart city25
Discrete hybrid cuckoo search and simulated annealing algorithm for solving the job shop scheduling problem25
FONS: a fog orchestrator node selection model to improve application placement in fog computing25
Efficient designs of quantum-dot cellular automata multiplexer and RAM with physical proof along with power analysis25
Efficient number theoretic transform implementation on GPU for homomorphic encryption25
Development of a yoga posture coaching system using an interactive display based on transfer learning24
TRAM: Technique for resource allocation and management in fog computing environment24
Prediction of highway asphalt pavement performance based on Markov chain and artificial neural network approach24
E2LG: a multiscale ensemble of LSTM/GAN deep learning architecture for multistep-ahead cloud workload prediction24
Intelligent malware detection based on graph convolutional network24
A deep learning approach in predicting products’ sentiment ratings: a comparative analysis23
FPGA acceleration on a multi-layer perceptron neural network for digit recognition23
Protection of data privacy from vulnerability using two-fish technique with Apriori algorithm in data mining23
Analysis and comparison of machine learning classifiers and deep neural networks techniques for recognition of Farsi handwritten digits23
Adoption value of deep learning and serological indicators in the screening of atrophic gastritis based on artificial intelligence23
Dynamic scheduling of tasks in cloud computing applying dragonfly algorithm, biogeography-based optimization algorithm and Mexican hat wavelet23
Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks23
Optimizing bag-of-tasks scheduling on cloud data centers using hybrid swarm-intelligence meta-heuristic22
Novel design and simulation of reversible ALU in quantum dot cellular automata22
A latency-aware and energy-efficient computation offloading in mobile fog computing: a hidden Markov model-based approach22
K-means tree: an optimal clustering tree for unsupervised learning22
The improvement in obstacle detection in autonomous vehicles using YOLO non-maximum suppression fuzzy algorithm22
Financial causal sentence recognition based on BERT-CNN text classification22
Sliding window-based LightGBM model for electric load forecasting using anomaly repair21
Consensus-based bundle algorithm with local replanning for heterogeneous multi-UAV system in the time-sensitive and dynamic environment21
Analytical models for availability evaluation of edge and fog computing nodes21
The performances of iterative type-2 fuzzy C-mean on GPU for image segmentation21
A new method of abnormal behavior detection using LSTM network with temporal attention mechanism21
Kubernetes in IT administration and serverless computing: An empirical study and research challenges21
Considerations about learning Word2Vec21
F-LEACH: a fuzzy-based data aggregation scheme for healthcare IoT systems21
AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things21
Multi-objective optimal allocation of regional water resources based on slime mould algorithm21
RETRACTED ARTICLE: An improved privacy-preserving data mining technique using singular value decomposition with three-dimensional rotation data perturbation21
CFIN: A community-based algorithm for finding influential nodes in complex social networks21
Hierarchical clustering and routing protocol to ensure scalability and reliability in large-scale wireless sensor networks20
Energy-efficient polyglot persistence database live migration among heterogeneous clouds20
Deep learning techniques for tumor segmentation: a review20
Mapping techniques in multicore processors: current and future trends20
PSO-RDAL: particle swarm optimization-based resource- and deadline-aware dynamic load balancer for deadline constrained cloud tasks20
Efficient design and implementation of a robust coplanar crossover and multilayer hybrid full adder–subtractor using QCA technology20
LBTM: A lightweight blockchain-based trust management system for social internet of things20
Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography20
Forecasting peak energy demand for smart buildings20
Quasi oppositional Aquila optimizer-based task scheduling approach in an IoT enabled cloud environment20
Prediction-based underutilized and destination host selection approaches for energy-efficient dynamic VM consolidation in data centers20
Optimal demultiplexer unit design and energy estimation using quantum dot cellular automata20
An optimized image watermarking algorithm based on SVD and IWT20
A transfer learning-based efficient spatiotemporal human action recognition framework for long and overlapping action classes19
A review on architecture and models for autonomic software systems19
Design and implementation of a cloud-based event-driven architecture for real-time data processing in wireless sensor networks19
A latency-aware task scheduling algorithm for allocating virtual machines in a cost-effective and time-sensitive fog-cloud architecture19
Recognition of food type and calorie estimation using neural network19
A firefly algorithm for power management in wireless sensor networks (WSNs)19
Implementation of real estate contract system using zero knowledge proof algorithm based blockchain19
An ACO-based multi-objective optimization for cooperating VM placement in cloud data center19
Deep learning-based algorithm for vehicle detection in intelligent transportation systems19
Tool wear prediction using convolutional bidirectional LSTM networks19
Auditable attribute-based data access control using blockchain in cloud storage19
A hybrid CNN-LSTM model for predicting server load in cloud computing19
A new deep intuitionistic fuzzy time series forecasting method based on long short-term memory19
A survey of energy-saving technologies in cloud data centers19
RETRACTED ARTICLE: FSO-LSTM IDS: hybrid optimized and ensembled deep-learning network-based intrusion detection system for smart networks19
Hybrid binary arithmetic optimization algorithm with simulated annealing for feature selection in high-dimensional biomedical data18
Structure-preserving NPR framework for image abstraction and stylization18
Trend analysis using agglomerative hierarchical clustering approach for time series big data18
A secure three-factor-based authentication with key agreement protocol for e-Health clouds18
Multilevel thresholding using an improved cuckoo search algorithm for image segmentation18
An efficient DBSCAN optimized by arithmetic optimization algorithm with opposition-based learning18
Cyber-physical systems for structural health monitoring: sensing technologies and intelligent computing18
An enhanced AHP-TOPSIS-based clustering algorithm for high-quality live video streaming in flying ad hoc networks18
A cluster-tree-based energy-efficient routing protocol for wireless sensor networks with a mobile sink18
A novel state transition simulated annealing algorithm for the multiple traveling salesmen problem18
Corona virus optimization (CVO): a novel optimization algorithm inspired from the Corona virus pandemic18
GSAGA: A hybrid algorithm for task scheduling in cloud infrastructure17
Algorithms and software for data mining and machine learning: a critical comparative view from a systematic review of the literature17
Accelerating number theoretic transform in GPU platform for fully homomorphic encryption17
A queuing theory model for fog computing17
An evolutionary multi-hidden Markov model for intelligent threat sensing in industrial internet of things17
OKCM: improving parallel task scheduling in high-performance computing systems using online learning17
Stochastic models for performance and cost analysis of a hybrid cloud and fog architecture17
Improved salp swarm algorithm based on the levy flight for feature selection17
Investigating multiple defects on a new fault-tolerant three-input QCA majority gate17
Deep knowledge-aware framework for web service recommendation17
Multi-spectral remote sensing land-cover classification based on deep learning methods17
A blockchain-based secure storage and access control scheme for supply chain finance17
Token-based approach in distributed mutual exclusion algorithms: a review and direction to future research17
Energy-saving distributed monitoring-based firefly algorithm in wireless sensors networks17
The implementation of data storage and analytics platform for big data lake of electricity usage with spark17
A hybrid bi-objective scheduling algorithm for execution of scientific workflows on cloud platforms with execution time and reliability approach17
Quantum-inspired binary chaotic salp swarm algorithm (QBCSSA)-based dynamic task scheduling for multiprocessor cloud computing systems17
A binary PSO-based ensemble under-sampling model for rebalancing imbalanced training data17
Replication and data management-based workflow scheduling algorithm for multi-cloud data centre platform17
A novel IoT–fog–cloud-based healthcare system for monitoring and predicting COVID-19 outspread17
A multi-label ensemble predicting model to service recommendation from social media contents17
Optimal circulant graphs as low-latency network topologies16
ETA-HP: an energy and temperature-aware real-time scheduler for heterogeneous platforms16
Sampling-based visual assessment computing techniques for an efficient social data clustering16
FAGWO-H: A hybrid method towards fault-tolerant cluster-based routing in wireless sensor network for IoT applications16
Neural network-based indoor localization system with enhanced virtual access points16
A novel weight-oriented graph convolutional network for aspect-based sentiment analysis16
Accelerating Louvain community detection algorithm on graphic processing unit16
Optimal fault-tolerant quantum comparators for image binarization16
Availability model for edge-fog-cloud continuum: an evaluation of an end-to-end infrastructure of intelligent traffic management service16
Searchable encryption on the cloud: a survey16
A hybrid machine learning approach for detecting unprecedented DDoS attacks16
Dynamic clustering method for imbalanced learning based on AdaBoost16
Construction and verification of color fundus image retinal vessels segmentation algorithm under BP neural network16
Binary quantum-inspired gravitational search algorithm-based multi-criteria scheduling for multi-processor computing systems16
Kubernetes distributions for the edge: serverless performance evaluation16
An application of MOGW optimization for feature selection in text classification16
Human pose, hand and mesh estimation using deep learning: a survey16
Automated detection of age-related macular degeneration using a pre-trained deep-learning scheme15
Design of an IoT DDoS attack prediction system based on data mining technology15
Improving the learning of self-driving vehicles based on real driving behavior using deep neural network techniques15
An investigation and comparison of machine learning approaches for intrusion detection in IoMT network15
Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier15
A deep learning-based CEP rule extraction framework for IoT data15
Performance optimization in delay tolerant networks using backtracking algorithm for fully credits distribution to contrast selfish nodes15
A novel method to improve computational and classification performance of rice plant disease identification15
Traffic sign detection based on improved faster R-CNN for autonomous driving15
A comparative analysis of prominently used MCDM methods in cloud environment15
Building a model to exploit association rules and analyze purchasing behavior based on rough set theory15
The predicting public sentiment evolution on public emergencies under deep learning and internet of things15
RETRACTED ARTICLE: Intrusion detection based on machine learning in the internet of things, attacks and counter measures15
Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function15
Driver attention prediction based on convolution and transformers15
PyDTNN: A user-friendly and extensible framework for distributed deep learning15
THS-IDPC: A three-stage hierarchical sampling method based on improved density peaks clustering algorithm for encrypted malicious traffic detection15
A hybrid list-based task scheduling scheme for heterogeneous computing15
Realization of ultrafast all-optical NAND and XNOR logic functions using carrier reservoir semiconductor optical amplifiers15
Dynamic and scalable multi-level trust management model for Social Internet of Things15
Job scheduler for streaming applications in heterogeneous distributed processing systems14
An optimized FP-growth algorithm for discovery of association rules14
Attention-based Conv-LSTM and Bi-LSTM networks for large-scale traffic speed prediction14
FPGA-based accelerator for object detection: a comprehensive survey14
A smart adaptive particle swarm optimization–support vector machine: android botnet detection application14
A novel multiclass priority algorithm for task scheduling in cloud computing14
Multi-objective NSGA-II optimization framework for UAV path planning in an UAV-assisted WSN14
Blockchain-based federation of wireless sensor nodes14
Performance evaluation and optimization of a task offloading strategy on the mobile edge computing with edge heterogeneity14
Exploring the website object layout of responsive web design: results of eye tracking evaluations14
Colony search optimization algorithm using global optimization14
A lightweight neural network framework using linear grouped convolution for human activity recognition on mobile devices14
Hybrid-based framework for COVID-19 prediction via federated machine learning models14
Dynamic opposite learning enhanced artificial ecosystem optimizer for IIR system identification14
Secure decentralized peer-to-peer training of deep neural networks based on distributed ledger technology14
Knowledge-based virtual outdoor weather event simulator using unity 3D14
Hybrid deep transfer learning architecture for industrial fault diagnosis using Hilbert transform and DCNN–LSTM13
Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems13
An evolutionary game approach to IoT task offloading in fog-cloud computing13
FRLLE: a failure rate and load-based leader election algorithm for a bidirectional ring in distributed systems13
Reliability-aware task scheduling for energy efficiency on heterogeneous multiprocessor systems13
Accurate computing of facial expression recognition using a hybrid feature extraction technique13
Collaborative detection and mitigation of DDoS in software-defined networks13
Hybrid feature selection based on SLI and genetic algorithm for microarray datasets13
Recognizing human behaviors from surveillance videos using the SSD algorithm13
Priority-based joint EDF–RM scheduling algorithm for individual real-time task on distributed systems13
A semi-supervised approach in detecting sentiment and emotion based on digital payment reviews13
Construction and implementation of a college talent cultivation system under deep learning and data mining algorithms13
An efficient U-Net framework for lung nodule detection using densely connected dilated convolutions13
Chaotic-based divide-and-conquer feature selection method and its application in cardiac arrhythmia classification13
DDBWS: a dynamic deadline and budget-aware workflow scheduling algorithm in workflow-as-a-service environments13
Regional steel price index forecasts with neural networks: evidence from east, south, north, central south, northeast, southwest, and northwest China13
A framework of genetic algorithm-based CNN on multi-access edge computing for automated detection of COVID-1913
Tails in the cloud: a survey and taxonomy of straggler management within large-scale cloud data centres13
A CSO-based approach for secure data replication in cloud computing environment13
0.026749134063721