Concurrency and Computation-Practice & Experience

Papers
(The TQCC of Concurrency and Computation-Practice & Experience is 4. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-05-01 to 2026-05-01.)
ArticleCitations
An Android API Recommendation Approach Based on API Dependency Paths Learning122
A modified graywolf‐basedchameleon swarm algorithm for minimizing energy consumption and enabling secure communication in wireless sensor network86
FreAPNet: Learnable Amplitude–Phase Parameterization and Dual‐Path Frequency Learning for Multivariate Time Series Forecasting75
Blockchain Consensus With Proof of Consultative Validation‐Based Secure Framework for IoV Environment for Network Layer Attack Mitigation Using Adapt58
Robust Generative Visual Tracker Based on Lion Swarm Optimization Algorithm56
Automated Classification of Skin Diseases Using Microscopic Images: A Machine Learning Approach55
Performance evaluation of accessibility checker tool for educational websites55
A review on optimization techniques for medical image analysis52
LGRDet: A Light Object Detection Network for Gesture Recognition48
Blockchain based integrity assurance framework for COVID‐19 information management & decision making at National Command Operation Center, Pakistan47
Issue Information47
Opportunistic coding across on‐route dominating nodes in a flow‐orientedSDNenabledWSN47
Issue Information45
Issue Information43
Efficient task scheduling on the cloud using artificial neural network and particle swarm optimization42
Quantum Computer Architecture for Quantum Error Correction With Distributing Process to Multiple Temperature Layers41
Determining approximate solution of partial differential equations using radial basis function model trained with parallel symbiotic organisms search algorithm39
Issue Information38
Joint optimal beam forming and resource allocation in intelligent reflecting surface aided wireless power transfer rate splitting multiple access system37
A fuzzy model for generalized transportation problems in China37
Post‐quantum secure two‐party computing protocols against malicious adversaries35
Blue Waters system and component reliability32
Improving the efficiency of graph algorithm executions on high‐performance computing32
FPHO: Fractional Pelican Hawks optimization based container consolidation in CaaS cloud32
DRRMDPF : A Queue Management Strategy Based on Dynamic Resource Allocation and Markov Decision Process in Named Dat31
Long Tail and Composition‐Supervised LightGCL for Interactive Web API Recommendation31
Application of Decision Tree Mining Algorithm Based on Information Entropy in Intelligent Power Marketing31
A Comprehensive Review of Machine Learning Applications for Advancing Reliability and Safety: A Multi‐Method Survey of Models and Techniques30
Enhancing CNN‐LSTM neural networks using jellyfish search algorithm for pandemic modeling29
Cascade Ownership Verification Framework Based on Invisible Watermark for Model Copyright Protection28
Modified Cryptosystem‐Based Authentication Protocol for Internet of Things in Fog Networks28
A Comparative Analysis on the Services Offered by Amazon Web Services and Microsoft Azure27
Issue Information27
Optimizing Node‐Level Data Access Time Using Cluster‐Based Deep Reinforcement Learning Models27
A feed forward deep neural network model using feature selection for cloud intrusion detection system26
Differential privacy: Review of improving utility through cryptography‐based technologies26
Extreme learning with projection relational algebraic secured data transmission for big cloud data25
Distributed low‐latency broadcast scheduling for multi‐channel duty‐cycled wireless IoT networks25
Updated delegated proof of stake and Nash equilibrium: A mining pool game model for blockchain network25
Multi‐objective Firefly algorithm combining logistic mapping and Cauchy mutation25
Stacked ensemble modeling for improved tuberculosis treatment outcome prediction in pediatric cases25
DWTYOLO : Wavelet‐Based Detection to Enhance Sensor Resolution for Small Targets24
A Novel Adaptive Graph Neural Network Based on Meta‐Learning for Cross‐Domain Few‐Shot Learning24
Shuffled shepherd political optimization‐based deep learning method for credit card fraud detection24
A new parallel tabu search algorithm for the optimization of the maximum vertex weight clique problem23
Towards a robust scale‐free network in internet of health things against multiple attacks using an inter‐core based reconnection strategy23
ONOS Flood Defender: A Real‐Time Flood Attacks Detection and Mitigation System in SDN Networks23
Novel segmentation and classification algorithm for detection of tomato leaf disease23
Accelerating Healthcare Data Access: A Blockchain and Decentralized Indexing Approach23
Multi‐objective GA to schedule task graphs on heterogeneous voltage frequency islands22
Privacy Protection During the Issuance and Revocation of Verifiable Credentials in Self‐Sovereign Identity22
An Efficient Content‐Based Authentication Scheme for Tamper Detection and Localization With Medical Images Using ORB Keypoints and Voronoi Tessellati22
BAC: A block alliance consensus mechanism for the mine consortium blockchain22
An efficient machine learning based ventricular late potential detection and classification technique for cardiac healthcare22
Entropy and improved k‐nearest neighbor search based under‐sampling (ENU) method to handle class overlap in imbalanced datasets22
Cuckoo Search Algorithm With Ensemble Strategy for Continuous Optimization Problems22
Stackedmulti‐layersecurity for Hadoop distributed file system usingHSCTsteganography21
21
Reactive power control of hybrid systems using improved coyote optimizer21
OCTRA‐5G: Osmotic computing based task scheduling and resource allocation framework for 5G21
Structure‐Aware Representation Learning for Effective Performance Prediction21
Non‐orthogonal multiple access‐based task processing and energy optimization in vehicular edge computing networks21
Dynamic Job Scheduling for Energy Savings in YARN: A Comparative Study With Benchmark Workloads20
NLSP: A novel lattice‐based secure primitive for privacy‐preserving smart grid communications20
20
Object‐aware deep feature extraction for feature matching20
PB3Opt: Profile‐based biased Bayesian optimization to select computing clusters on the cloud20
Processing‐in‐memory based multilateration localization in wireless sensor networks using memristor crossbar arrays20
An intelligent signboard to assign the speed limit on ways using ANN20
Secure paths based trustworthy fault‐tolerant routing in data center networks19
Harris hawk optimization trained artificial neural network for anomaly based intrusion detection system19
An efficient fault tolerance scheme based enhanced firefly optimization for virtual machine placement in cloud computing19
19
Enhancing Wildfire Preparedness and Response: A Drone Network‐Based Early Warning System for Bushfires19
A novel approach to QoS‐aware resource allocation in NOMA cellular HetNets using multi‐layer optimization18
Accelerating deep learning inference via layer truncation and transfer learning for fingerprint classification18
Community detection by influential nodes based on random walk distance18
PKD‐Net: Distillation of prior knowledge for image completion by multi‐level semantic attention17
Migration Using Context Cache for Multicore RISC‐V Processor17
Portable PGAS ‐Based GPU ‐Accelerated Branch‐And‐Bound Algorithms at Scale17
Identification of influential vertices in complex networks: A hitting time‐based approach17
SDT‐MCS: Topology‐Aware Microservice Orchestration With Adaptive Learning in Cloud‐Edge Environments17
Multilayer privacy‐preserving model for security and privacy access control in edge computing17
An Algorithm for Matching in a (3,3)‐Hypergraph With One‐Sided Preferences Having Quadratic Unpopularity Factor17
Multi‐Robot Path Planning Based on Lens Imaging Reverse Learning Harris Hawk Algorithm in Dynamic Environment17
Bitcoin price prediction using optimized multiplicative long short term memory with attention mechanism using modified cuckoo search optimization17
PMS‐LoFTR: A Model for Cattle Identification Based on Image Matching17
Online feature selection for hierarchical classification learning based on improved ReliefF17
FBO‐RNN: Fuzzy butterfly optimization‐basedRNN‐LSTMfor extracting sentiments from Twitter Emoji database17
Discrete Bimodal Normal Distribution: Theory and Applications to Discrete Failure Lifetime and Count Data17
Network traffic classification based‐ masked language regression model using CNN16
Retraction16
Cloud Elasticity of Microservices‐Based Applications: A Survey16
Contention Based Single‐Server Queuing Model for Efficient Data Transmission in VANETs Using Stochastic Process16
The blockchain conundrum: An in‐depth examination of challenges, contributing technologies, and alternatives16
Enhancing Edge Environment Scalability: Leveraging Kubernetes for Container Orchestration and Optimization16
Transaction Spatio‐Temporal Distribution for Permissioned Blockchain Performance Profiling16
Optimizing computational costs of Spark for SARS‐CoV‐2 sequences comparisons on a commercial cloud16
Object pose estimation based on stereo vision with improvedK‐DtreeICPalgorithm16
Explainable AI for DBA: Bridging the DBA's experience and machine learning in tuning database systems16
Research and Analysis of Fixed Time Positioning Algorithm Based on Local Azimuth Measurement15
EEYOLO11n : Improved Detection of Rice Leaf Diseases via Edge Enhancement15
Handoff performance analysis of PMIPv6‐based distributed mobility management protocol‐urban scenario15
HIM‐PyraNet: Hierarchical Attention and Region‐Focused Lightweight Network for Micro‐Expression Recognition15
TIDE‐Net: A Two‐Stage Temporal Deep Learning Framework for Multi‐Granular IoT Intrusion Detection15
A Multidimensional Virtual Resource Allocation Framework With Energy‐Aware Physical Resource Mapping for Green Cloud Computing15
A location‐aware physical unclonable function and Chebyshev map‐based mutual authentication mechanism for internet of surveillance drones15
Effective Cluster Head and Routing Scheme Estimation Using Mixed Attention‐Based Drift Enabled Federated Deep Reinforcement Learning in Wireless Sensor Networks15
SOC Prediction Model for Lithium‐Ion Batteries Based on Improved CEEMD With Adaptive Noise and Stacking Ensemble Learn15
Artificial neural network‐driven federated learning for heart stroke prediction in healthcare 4.0 underlying 5G15
A holistic evaluation methodology for configuring production data centers14
A negotiation framework for the cloud using rough set theory‐based preference prediction14
Blockchain‐based certificateless public auditing with privacy‐preserving for cloud‐based cyber‐physical systems14
Awareness based gannet optimization for source location privacy preservation with multiple assets in wireless sensor networks14
Survey on compressed sensing reconstruction method for3Ddata14
Issue Information14
A generation of synthesized trajectories of free moving objects for testing a set of continuous spatio‐temporal queries14
Unveiling the Invisible: Powering Security Threat Detection in WSN With AI14
An intelligent MAC protocol for mission critical applications in wireless sensor networks14
Edge intelligence‐enabled cyber‐physical systems14
Human activity recognition based on integration of multilayer information of convolutional neural network architecture14
DONUTS: An efficient method for checkpointing in non‐volatile memories14
Secuyolo: Secure Object Detection Framework With Darknet‐53 and CBAM in Edge Devices14
Novel hawk swarm‐optimized deep learning classification with K‐nearest neighbor based decision making for autonomous vehicle movement controller14
Whale social optimization driven deep recurrent neural network for loan eligibility prediction14
Workflow aware analytical model to predict performance and cost of serverless execution13
Enhanced routing using recurrent neural networks in software defined‐data center network13
Fair XIDS: Ensuring fairness and transparency in intrusion detection models13
A survey on lattice‐based security and authentication schemes for smart‐grid networks in the post‐quantum era13
Privacy‐Secure Asynchronous Federated Multimodal Pedestrian Trajectory Prediction Models13
Cybersecurity‐Driven Strategy: Resilient Base Stations Deployment for Robust Open RAN 5G/6G Networks13
Seismic P‐wave first‐arrival picking model based on EQK‐IncResNet13
Classification of stochastic processes with topological data analysis13
Algebraic Connectivity Maximizing Regular Graphs: Special Case Analysis and Depth‐First Search13
Correction to Parallel Symmetric Appearance‐Motion Framework with Diffusion and Refinement Blocks for Video Anomaly Detection System13
Generating Robotic Control Strategies With LLMs : Via Human–Robot Voice Interaction13
Deep Learning–Based Sentiment and Topic Analysis of Turkish Football Fans on X Platform13
The dummy‐based trajectory privacy protection method to resist correlation attacks in Internet of Vehicles13
PointerChain : A Quantum Enabled Dual‐Layer Blockchain PHR Sharding Model13
13
Retraction13
ERL‐RTDETR: A Lightweight Transformer‐Based Framework for High‐Accuracy Apple Disease Detection in Precision Agriculture13
Vehicle Detection and Tracking Method for Highway Fog Scene: Fusion Improvement of AGYOLOv10n a13
Multi‐View Image Segmentation via Dynamic Lightweight Model Adaptation and Adaptive GPU Load Redistribution12
LoHDP: Adaptive local differential privacy for high‐dimensional data publishing12
Visualization of profiling and tracing in CPU‐GPU programs12
An efficient hand gesture recognition based on optimal deep embedded hybrid convolutional neural network‐long short term memory network model12
Low‐Light Image Enhancement Algorithm Based on Improved MSRCP With Chromaticity Preservation12
Modality aware contrastive learning for multimodal human activity recognition12
Real‐Time HRI: Human Hand Gesture Mapping for 7‐DoF Robotic Arm Operation12
A Distributed Parallel Network Intrusion Detection System Based on Ray Framework With GPU Acceleration12
Adaptive Orchestration for Large‐Scale Inference on Heterogeneous Accelerator Systems: Balancing Cost, Performance, and Resilience12
GSRC2N: Graph Feature Extracted Spar‐Raven Optimized CNN Based Crypto Mining Framework12
A Robust Watermarking for Camera‐Captured Images Using Few‐Shot Learning and Simulated Noise Layer12
Blockchain‐based transparent and certificateless data integrity auditing for cloud storage12
Analysis and Prediction of Periodic Mining‐Induced Strata Behavior Based on RGAKDE Method12
Controlling energy aware clustering and multihop routing protocol for IoT assisted wireless sensor networks12
Numerical Simulation on Effects of EEC Positions and Heights on Pool Fire Temperature Distribution Characteristics in Engine Fan Cavity12
12
Neighbor cleaning learning based cost‐sensitive ensemble learning approach for software defect prediction12
TAFLE : Task‐Aware Flow Scheduling in Spine‐Leaf Network via Hierarchical Auto‐Associative Polynomial Reg Net12
Provably secure lightweight certificateless lattice‐based authenticated key exchange scheme for IIoT11
Object detection and estimation: A hybrid image segmentation technique using convolutional neural network model11
A Quantum‐Inspired Source‐Distributed Opportunistic Routing Protocol for Reliable Routing in Underwater Wireless Sensor Networks11
Quasi‐identifier recognition with echo chamber optimization‐based anonymization for privacy preservation of cloud storage11
Issue Information11
Issue Information11
Creating orthophotos with unmanned aerial vehicles and examining its accuracy and usability in geodetic applications11
Secure personal authentication in fog devices via multimodal rank‐level fusion11
Issue Information11
Issue Information11
CFISRO : Cross‐Modal Feature Interaction and Similarity Ranking Optimization for Image‐Text Retrieval11
Multi‐Strategy Fusion Binary Zebra Optimization Algorithm for Solving Complex Industrial Process Data Feature Selection and Prediction Models11
Noise‐robust neural networks for medical image segmentation by dual‐strategy sample selection11
Issue Information11
A novel optimized intelligent green signal timing system for urban corridor11
Implementation and evaluation of two parallel computational models for the simulation of a long‐haul DWDM system limited by FWM11
Community Detection Using Nonnegative Matrix Factorization and Sparse Linear Coding11
11
A Cross‐Chain Architecture for Interoperable and Trusted Multi‐Party Collaboration11
HRCUNet: Hierarchical Region Contrastive Learning for Segmentation of Breast Tumors in DCEMRI11
Networking in next generation disaggregated datacenters11
Medical concept integrated residual short‐long temporal convolutional networks for predicting clinical events11
MPI‐Based Approaches to Overlap Computation and I/O in Geophysical Simulations11
A Secure and Communication‐Efficient Federated Recommendation Method With Blockchain10
Privacy‐Preserving Real‐Time Smart Grid Topology Analysis: A Graph Neural Networks Approach10
Early experiences on the OLCF Frontier system with AthenaPK and Parthenon‐Hydro10
Comparing Machine Learning Models for Short‐Term U.S. Treasury Yield Forecasting10
Multi‐User Boolean Keyword Searchable Encryption With Fine‐Grained Access Control for Cloud Storage10
Retraction10
Correction to “Secure Data Authentication for Remotely Stored Data Using Bilinear Pairing on Elliptic Curves With Optimized Data Block Size”10
A Multi‐Objective Decision‐Making Neural Network: Effective Structure and Learning Method10
Performance assessment of ensembles of in situ workflows under resource constraints10
Feature selection‐integrated classifier optimisation algorithm for network intrusion detection10
Adaptive Parallelization Based on Frame‐Level and Tile‐Level Parallelisms for VVC Encoding10
Detection of zero‐day attacks in computer networks using combined classification10
A Vertex Partitioning Algorithm for Large‐Scale Uncertain Graphs10
Context‐Aware Prompt Engineering for Large Language Models in Autonomous Vehicles10
MetaLP‐DGI: Meta‐Learning‐Based Link Prediction With Centrality‐Aware Deep Graph Infomax Embeddings10
TPST : A Traffic Flow Prediction Model Based on Spatial–Temporal Identity10
Detection and categorization of acute intracranial hemorrhage subtypes using a multilayer DenseNet‐ResNet architecture with improved random forest classifier10
Improving cancer prediction using feature selection in spark environment10
Intrusion Detection System in IoT 5G Networks Based on LSSVM and Harmony Search Optimization10
A multi‐queue priority‐based task scheduling algorithm in fog computing environment10
Security Defense Strategy for Dispersed Computing Based on Backward Mean Field Games10
Learning multi‐organ and tumor segmentation from partially labeled datasets by a conditional dynamic attention network10
Improved mayfly optimization deep stacked sparse auto encoder feature selection scorched gradient descent driven dropout XLM learning framework for software defect prediction9
Time‐based DDoS attack detection through hybrid LSTM‐CNN model architectures: An investigation of many‐to‐one and many‐to‐many approaches9
Comparative parotid gland segmentation by using ResNet‐18 and MobileNetV2 based DeepLab v3+ architectures from magnetic resonance images9
Multi‐Attribute Many‐to‐One Elderly Care Service Matching Group Decision‐Making Considering Double Intermediaries9
Multi‐Criteria Optimization of Scientific Workflow Schedules for Improved Energy Efficiency in Cloud Infrastructures9
RETRACTION: Minimal Channel Cost‐Based Energy‐Efficient Resource Allocation Algorithm for Task Offloading Under Fog Computing Environment9
Research on frequency band sparse optimization algorithm in health index of rolling bearing9
FiQoT : An Energy‐Efficient Fog‐Assisted Architecture for Quality‐Driven IoT ‐Enabled Systems9
Parallel aeroacoustic computation of unsteady transonic weapon bay using detached‐eddy simulation via open computational fluid dynamics source codes9
DLDC: Deep learning‐based deadline constrained load balancing technique9
On the security of fully homomorphic encryption for data privacy in Internet of Things9
Multilevel security for medical image using heterogeneous chaotic map and deoxyribonucleic acid sequence operations9
Machine learning and IoT‐based model for patient monitoring and early prediction of diabetes9
An IPv6 Address Active Probing Method Based on Hierarchical Sparse Expert Modeling9
GPU implementations of deflate encoding and decoding9
Incremental Similarity‐Based Label Propagation Algorithm for Dynamic Community Detection9
AMter : An end‐to‐end model for transcriptional terminators prediction by extracting semantic feature automatically based on attention mechanism9
An improved brain storm optimization with chunking‐grouping method9
A Multi‐Strategy Fusion for Mobile Robot Path Planning via Dung Beetle Optimization9
Short‐Term Power Load Prediction Based on Cluster Analysis and Temporal Convolutional Networks of Attention Mechanism9
Issue Information9
GTCExplainer: Interpretable Graph Convolutional Networks for Molecular Activity Prediction9
COVID‐19: Machine learning for safe transportation9
Towards Decentralized Hybrid Container Elasticity With Fault‐Tolerant Orchestration and Predictive, Risk‐Aware Thresholding9
A Variable Density‐Based Clustering Algorithm Based on Reverse Nearest Neighbors9
Special Issue on High‐Performance Computing Conference ( BAŞARIM 2024)9
Early detection and classification of liver diseases in ultrasound images using hybrid machine learning techniques9
Combining bidirectional long short‐term memory and self‐attention mechanism for code search9
Kibria‐Lukmantype estimator for gamma regression model9
Optimal Control of Information Dissemination Based on Model‐Free Reinforcement Learning9
Optimal Sampling Rate Selection for Parallel Hybrid Sampling Framework of Imbalanced Data Classification9
DMoiSDN: A defensive mechanism of object integrity for SDN9
A Three‐Stage Prediction Model Based on Transformer for Chronic Kidney Disease9
Issue Information9
9
Real‐time prediction of horizontal drilling pressure based on convolutional Transformer9
A taxonomy and survey of big data in social media9
Smart bin: Waste segregation system using deep learning‐Internet of Things for sustainable smart cities9
Adam‐Ladybug Beetle Optimization enabled multi‐objective service placement strategy in fog computing9
Object detection and multi‐object tracking based on optimized deep convolutional neural network and unscented Kalman filtering8
8
An Incremental Learning Framework for Industrial Time Series Prediction With Sample‐Importance‐Aware Replay and Performance‐Driven Iterative Ensemble8
Multi‐task deep neural networks for just‐in‐time software defect prediction on mobile apps8
Predicting building energy utilization with energy plus simulation and advanced sea lion optimization algorithm based on Elman neural network8
0.141676902771