Concurrency and Computation-Practice & Experience

Papers
(The TQCC of Concurrency and Computation-Practice & Experience is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-03-01 to 2024-03-01.)
ArticleCitations
Sentiment analysis on product reviews based on weighted word embeddings and deep neural networks227
Detection algorithm of safety helmet wearing based on deep learning112
Gesture recognition based on surface electromyography‐feature image73
Deep and reinforcement learning for automated task scheduling in large‐scale cloud computing systems68
Ensuring transparency and traceability of food local products: A blockchain application to a Smart Tourism Region60
A review of research on co‐training59
Chatbots: Security, privacy, data protection, and social aspects56
Gesture recognition based on multi‐modal feature weight55
Improved single shot multibox detector target detection method based on deep feature fusion53
Multi‐view frontal face image generation: A survey53
Enhancement of real‐time grasp detection by cascaded deep convolutional neural networks52
Occlusion gesture recognition based on improved SSD48
An efficient cloud‐based healthcare services paradigm for chronic kidney disease prediction application using boosted support vector machine48
A combination model based on transfer learning for waste classification48
A modified farmland fertility algorithm for solving constrained engineering problems43
Botnet attack detection in Internet of Things devices over cloud environment via machine learning40
Blockchain and cryptocurrencies: A classification and comparison of architecture drivers36
3D reconstruction based on photoelastic fringes35
Numerical simulation of thermal insulation and longevity performance in new lightweight ladle35
Distributed service‐level agreement management with smart contracts and blockchain34
Manipulator trajectory planning based on work subspace division33
Supervised link prediction using structured‐based feature extraction in social network33
From distributed machine learning to federated learning: In the view of data privacy and security31
Leveraging big data in smart cities: A systematic review30
Whale optimization algorithm based on nonlinear convergence factor and chaotic inertial weight30
Wrist angle prediction under different loads based on GA‐ELM neural network and surface electromyography30
A federated learning method for network intrusion detection30
Pattern2Vec: Representation of clickstream data sequences for learning user navigational behavior30
Principal component analysis, hidden Markov model, and artificial neural network inspired techniques to recognize faces28
A comparative study on geographic‐based routing algorithms for flying ad‐hoc networks28
An integrated framework for COVID‐19 classification based on classical and quantum transfer learning from a chest radiograph28
A systematic review on task scheduling in Fog computing: Taxonomy, tools, challenges, and future directions28
Multiscale generative adversarial network for real‐world super‐resolution27
Target localization in local dense mapping using RGBD SLAM and object detection27
TheKLestimator for the inverse Gaussian regression model27
Optimizing resource scheduling based on extended particle swarm optimization in fog computing environments26
A survey on the techniques, applications, and performance of short text semantic similarity26
Improving smart grid security through 5G enabled IoT and edge computing24
A new adjusted Liu estimator for the Poisson regression model24
Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks24
Big data and sentiment analysis: A comprehensive and systematic literature review23
Big data analytics for identifying electricity theft using machine learning approaches in microgrids for smart communities23
A robust multiclass 3D object recognition based on modern YOLO deep learning algorithms23
SEV‐Net: Residual network embedded with attention mechanism for plant disease severity detection23
Stock movement prediction with sentiment analysis based on deep learning networks22
SI‐EDTL: Swarm intelligence ensemble deep transfer learning for multiple vehicle detection in UAV images22
An optimal self adaptive deep neural network and spine‐kernelled chirplet transform for image registration22
Namib beetle optimization algorithm: A new meta‐heuristic method for feature selection and dimension reduction22
Using an optimized soil and water assessment tool by deep belief networks to evaluate the impact of land use and climate change on water resources21
A survey on analysis and detection of Android ransomware21
Towards general Internet of Vehicles networking: Routing protocols survey21
Classification of breast cancer mammogram images using convolution neural network21
Leveraging energy‐efficient load balancing algorithms in fog computing21
Characterization of abnormalities in breast cancer images using nature‐inspired metaheuristic optimized convolutional neural networks model20
An intrusion detection algorithm based on bag representation with ensemble support vector machine in cloud computing20
Toward data privacy preservation with ciphertext update and key rotation for IoT20
Feature extraction based on deep‐convolutional neural network for face recognition20
Implementation and evaluation of smart contracts using a hybrid on‐ and off‐blockchain architecture19
Rumor, misinformation among web: A contemporary review of rumor detection techniques during different web waves19
Single‐objective service composition methods in cloud manufacturing systems: Recent techniques, classification, and future trends19
Towards the steel plate defect detection: Multidimensional feature information extraction and fusion19
Implementation and evaluation of the information flow control for the Internet of Things18
Solving the last mile problem in logistics: A mobile edge computing and blockchain‐based unmanned aerial vehicle delivery system18
Fast and accurate computation of high‐order Tchebichef polynomials18
Computer vision‐based recognition of driver distraction: A review18
Controlling energy aware clustering and multihop routing protocol for IoT assisted wireless sensor networks18
Conditional generative adversarial networks based on the principle of homologycontinuity for face aging18
Opinion leaders' detection in dynamic social networks18
Vision‐based vehicle detection for road traffic congestion classification18
Developing a Liu‐type estimator in beta regression model18
Weight initialization based‐rectified linear unit activation function to improve the performance of a convolutional neural network model17
SERU: A cascaded SE‐ResNeXT U‐Net for kidney and tumor segmentation17
A hybrid classification method for Twitter spam detection based on differential evolution and random forest17
Price forecasting for real estate using machine learning: A case study on Riyadh city17
On the ridge estimation of the Conway‐Maxwell Poisson regression model with multicollinearity: Methods and applications17
Network intrusion detection based on ensemble classification and feature selection method for cloud computing17
Comparative parotid gland segmentation by using ResNet‐18 and MobileNetV2 based DeepLab v3+ architectures from magnetic resonance images16
Voting‐based intrusion detection framework for securing software‐defined networks16
CPU usage prediction for cloud resource provisioning based on deep belief network and particle swarm optimization16
Brain tumor segmentation and overall survival period prediction in glioblastoma multiforme using radiomic features16
A novel similarity measure of link prediction in multi‐layer social networks based on reliable paths16
Survey on psychotherapy chatbots16
Sampling business process event logs using graph‐based ranking model16
A robust interclass and intraclass loss function for deep learning based tongue segmentation16
Support vector machine versus convolutional neural network for hyperspectral image classification: A systematic review16
Short text similarity measurement using context‐aware weighted biterms16
A hybrid approach for efficient multi‐classification of white blood cells based on transfer learning techniques and traditional machine learning methods16
A self‐learning artificial bee colony algorithm based on reinforcement learning for a flexible job‐shop scheduling problem16
Three‐class brain tumor classification from magnetic resonance images using separable convolution based neural network15
Deep maxout network for lung cancer detection using optimization algorithm in smart Internet of Things15
Designing a multi‐layer full‐adder using a new three‐input majority gate based on quantum computing15
Evaluating and analyzing the energy efficiency of CNN inference on high‐performance GPU15
Workflow scheduling using particle swarm optimization and gray wolf optimization algorithm in cloud computing15
A deep neural network learning‐based speckle noise removal technique for enhancing the quality of synthetic‐aperture radar images15
An efficient list scheduling algorithm with task duplication for scientific big data workflow in heterogeneous computing environments15
Blockchain‐based framework for secured storage, sharing, and querying of electronic healthcare records15
A roadmap towards energy‐efficient data fusion methods in the Internet of Things15
Improving word embedding quality with innovative automated approaches to hyperparameters15
Tatt‐BiLSTM: Web service classification with topical attention‐based BiLSTM15
Forecasting hydropower generation byGFDL‐CM3climate model and hybrid hydrological‐Elman neural network model based on Improved Sparrow Search Algorithm (ISSA)15
5G NB‐IoT: Efficient network call admission control in cellular networks15
A novel blind medical image watermarking scheme based on Schur triangulation and chaotic sequence14
DeePOF: A hybrid approach of deep convolutional neural network and friendship to Point‐of‐Interest (POI) recommendation system in location‐based social networks14
Text classification using improved bidirectional transformer14
A clustering‐based anonymization approach for privacy‐preserving in the healthcare cloud14
Distributed frameworks for detecting distributed denial of service attacks: A comprehensive review, challenges and future directions14
Two‐dimensional optimal path planning for autonomous underwater vehicle using a whale optimization algorithm14
Fusion of handcrafted and deep convolutional neural network features for effective identification of diabetic foot ulcer14
Developing robust ridge estimators for Poisson regression model14
Harnessing semantic segmentation masks for accurate facial attribute editing13
Time‐based legality of information flow in the capability‐based access control model for the Internet of Things13
Workflow provenance in the lifecycle of scientific machine learning13
Metaheuristic task scheduling algorithms for cloud computing environments13
Efficient and secure routing protocol based on Blockchain approach for wireless sensor networks13
Securing the access control policies to the Internet of Things resources through permissioned blockchain13
Dynamic load balancing assisted optimized access control mechanism for Edge‐Fog‐Cloud network in Internet of Things environment13
Development of robust Özkale–Kaçiranlar and Yang–Chang estimators for regression models in the presence of multicollinearity and outliers13
ML‐IDSDN: Machine learning based intrusion detection system for software‐defined network13
Blind image quality assessment based on the multiscale and dual‐domains features fusion13
A multimodal deep architecture for traditional Chinese medicine diagnosis13
Daily tourist flow forecasting using SPCA and CNN‐LSTM neural network12
Unmanned surface vessel obstacle avoidance with prior knowledge‐based reward shaping12
Measuring success for a future vision: Defining impact in science gateways/virtual research environments12
A deep and handcrafted features‐based framework for diagnosis of COVID‐19 from chest x‐ray images12
Topology hiding routing based on learning with errors12
Linear time algorithm for computing min‐max movement of sink‐based mobile sensors for line barrier coverage12
A hybrid location‐dependent ultra convolutional neural network‐based vehicle number plate recognition approach for intelligent transportation systems12
Extending collaborative filtering recommendation using word embedding: A hybrid approach12
Cooperative and feedback based authentic routing protocol for energy efficient IoT systems12
Pulmonary nodule detection based on 3D feature pyramid network with incorporated squeeze‐and‐excitation‐attention mechanism12
VoterChoice: A ransomware detection honeypot with multiple voting framework12
An effective architecture of digital twin system to support human decision making and AI‐driven autonomy12
Forecasting hyponatremia in hospitalized patients using multilayer perceptron and multivariate linear regression techniques12
An improved agglomerative hierarchical clustering anomaly detection method for scientific data12
Self‐adaptation on parallel stream processing: A systematic review12
Welding flame detection based on color recognition and progressive probabilistic Hough transform12
Dynamic topology control algorithm for node deployment in mobile underwater wireless sensor networks12
Convolutional neural network and its pretrained models for image classification and object detection: A survey11
Oppositional tunicate fuzzy C‐means algorithm and logistic regression for intrusion detection on cloud11
An iterative transfer learning framework for cross‐domain tongue segmentation11
Cost‐aware cloud bursting in a fog‐cloud environment with real‐time workflow applications11
Toward text psychology analysis using social spider optimization algorithm11
FPGA‐based HPC accelerators: An evaluation on performance and energy efficiency11
The forecasting of air transport passenger demands in Turkey by using novel meta‐heuristic algorithms11
A face recognition algorithm based on feature fusion11
A multiple feature fusion framework for video emotion recognition in the wild11
A deadline aware load balancing strategy for cloud computing11
Detection of global positioning system spoofing attack on unmanned aerial vehicle system11
A weakly supervised tooth‐mark and crack detection method in tongue image11
An energy‐efficient auto clustering framework for enlarging quality of service in Internet of Things‐enabled wireless sensor networks using fuzzy logic system11
Differentially private locality sensitive hashing based federated recommender system11
Echo state network‐based feature extraction for efficient color image segmentation11
COVID‐19 detection using hybrid deep learning model in chest x‐rays images11
Execution‐Cache‐Memory modeling and performance tuning of sparse matrix‐vector multiplication and Lattice quantum chromodynamics on A64FX11
The role of data management in the Industrial Internet of Things11
Transfer learning and fine‐tuned transfer learning methods' effectiveness analyse in the CNN‐based deep learning models11
Named Data Networking‐based communication model for Internet of Things using energy aware forwarding strategy and smart sleep mode11
A social hybrid recommendation system using LSTM and CNN11
Employing machine learning based malicious signal detection for cognitive radio networks10
Energy efficient and delay aware clustering in mobile adhoc network: A hybrid fruit fly optimization algorithm and whale optimization algorithm approach10
A electronic voting protocol based on blockchain and homomorphic signcryption10
An artificial intelligence approach for energy‐aware intrusion detection and secure routing in internet of things‐enabled wireless sensor networks10
Cyber situation perception for Internet of Things systems based on zero‐day attack activities recognition within advanced persistent threat10
Proactive load balancing fault tolerance algorithm in cloud computing10
An efficient framework for data aggregation in smart agriculture10
An efficient early detection of diabetic retinopathy using dwarf mongoose optimization based deep belief network10
A many‐objective integrated evolutionary algorithm for feature selection in anomaly detection10
A new image encryption algorithm based on optimized Lorenz chaotic system10
Reinforcement learning using fully connected, attention, and transformer models in knapsack problem solving10
Automatic classification and diagnosis of heart valve diseases using heart sounds with MFCC and proposed deep model10
Big data and machine learning framework for clouds and its usage for text classification10
5G network slicing: Fundamental concepts, architectures, algorithmics, projects practices, and open issues10
Understanding the use of message passing interface in exascale proxy applications10
Fuzzy artificial bee colony‐based CNN‐LSTM and semantic feature for fake product review classification10
A variant of teaching‐learning‐based optimization and its application for minimizing the cost of Workflow Execution in the Cloud Computing9
Content‐based and knowledge graph‐based paper recommendation: Exploring user preferences with the knowledge graphs for scientific paper recommendation9
Extended particle swarm optimization for feature selection of high‐dimensional biomedical data9
Optimizing bitmap index encoding for high performance queries9
House price prediction using hedonic pricing model and machine learning techniques9
EduChain: A highly available education consortium blockchain platform based on Hyperledger Fabric9
Hybrid convolutional neural network based classification of bacterial, viral, and fungal diseases on tomato leaf images9
Minimize the delays in software defined network switch controller communication9
A high‐performance FPGA‐based multicrossbar prioritized network‐on‐chip9
Web service selection and composition based on uncertain quality of service9
Sentiment analysis of social media data based on chaotic coyote optimization algorithm based time weight‐AdaBoost support vector machine approach9
Wind driven dragonfly algorithm for global optimization9
A proficient approach for face detection and recognition using machine learning and high‐performance computing9
Energy and cost aware workflow scheduling in clouds with deadline constraint9
Orchestrated sandboxed containers, unikernels, and virtual machines for isolation‐enhanced multitenant workloads and serverless computing in cloud9
Scheduling independent tasks in cloud environment based on modified differential evolution9
Provably secure signature‐based anonymous user authentication protocol in an Internet of Things‐enabled intelligent precision agricultural environment9
Substation instrumentation target detection based on multi‐scale feature fusion9
Network intrusion detection system for Internet of Things based on enhanced flower pollination algorithm and ensemble classifier9
A secure communication using multifactor authentication and key agreement techniques in internet of medical things for COVID‐19 patients9
Energy‐aware intelligent hybrid routing protocol for wireless sensor networks9
A performance study of meta‐heuristic approaches for quadratic assignment problem9
Combined adaptive neuro‐fuzzy inference system and genetic algorithm for e‐learning resilience assessment during COVID‐19 pandemic9
Experiences in porting mini‐applications to OpenACC and OpenMP on heterogeneous systems9
Gas consumption analysis of Ethereum blockchain transactions9
A new exponential estimators for analysis of COVID‐19 risk9
Tesia: A trusted efficient service evaluation model in Internet of things based on improved aggregation signature9
Optimizing execution for pipelined‐based distributed deep learning in a heterogeneously networked GPU cluster9
A survey on smart parking systems in urban cities9
LibreSocial: A peer‐to‐peer framework for online social networks9
Intrusion detection systems in the cloud computing: A comprehensive and deep literature review9
Underwater image enhancement using improved generative adversarial network9
An energy‐aware method for task allocation in the Internet of things using a hybrid optimization algorithm9
An intelligent intrusion detection system for distributed denial of service attacks: A support vector machine with hybrid optimization algorithm based approach9
Analyzing the performance of long short‐term memory architectures for malware detection models9
Literature review of vision‐based dynamic gesture recognition using deep learning techniques9
Crime activities prediction system in video surveillance by an optimized deep learning framework9
A deep learning method for automatic SMS spam classification: Performance of learning algorithms on indigenous dataset8
Effective intrusion detection system for IoT using optimized capsule auto encoder model8
Reducing the amount of out‐of‐core data access for GPU‐accelerated randomized SVD8
Task migration computation offloading with low delay for mobile edge computing in vehicular networks8
Web API recommendation via combining graph attention representation and deep factorization machines quality prediction8
A systematic mapping study for blockchain based on complex network8
Chinese clinical named entity recognition based on stacked neural network8
Towards a sustainable artificial intelligence: A case study of energy efficiency in decision tree algorithms8
A Non‐Dominated Sorting Genetic Algorithm‐II‐based approach to optimize the spectral and spatial quality of component substitution‐based pansharpened images8
UNIConv: An enhanced U‐Net based InceptionV3 convolutional model for DR semantic segmentation in retinal fundus images8
Short‐term traffic flow prediction based on whale optimization algorithm optimized BiLSTM_Attention8
A novel approach of intensified barnacles mating optimization for the mitigation of power system oscillations8
Lightweight edge‐based kNN privacy‐preserving classification scheme in cloud computing circumstance8
AI advisor platform for disaster response based on big data8
Improved spider monkey optimization‐based multi‐objective software‐defined networking routing with block chain technology for Internet of Things security8
Improved region convolutional neural network for ship detection in multiresolution synthetic aperture radar images8
Efficient deep learning models for brain tumor detection with segmentation and data augmentation techniques8
Cluster formation techniques for hierarchical real time tasks allocation on multiprocessor system8
SSAE‐MLP: Stacked sparse autoencoders‐based multi‐layer perceptron for main bearing temperature prediction of large‐scale wind turbines8
Autotuning PolyBench benchmarks with LLVM Clang/Polly loop optimization pragmas using Bayesian optimization8
Class‐index corpus‐index measure: A novel feature selection method for imbalanced text data8
Survey on radio resource allocation in long‐term evolution‐vehicle8
A malware detection method using satisfiability modulo theory model checking for the programmable logic controller system8
Detection of malware applications from centrality measures of syscall graph8
Modeling, simulation, and case analysis of COVID‐19 over network public opinion formation with individual internal factors and external information characteristics8
Classification of human's activities from gesture recognition in live videos using deep learning8
Modified jackknife Kibria–Lukman estimator for the Poisson regression model8
Design of recustomize finite impulse response filter using truncation based scalable rounding approximate multiplier and error reduced carry prediction approximate adder for image processing applicati8
A study on path planning optimization of mobile robots based on hybrid algorithm8
Forest fire detection on LANDSAT images using support vector machine8
Deep learning enabled cross‐lingual search with metaheuristic web based query optimization model for multi‐document summarization8
Modeling on virtual network embedding using reinforcement learning8
A two‐vector data‐prediction model for energy‐efficient data‐aggregation in wireless sensor network8
A survey on effects of adding explanations to recommender systems8
IoT‐TDMA: A performance evaluation of TDMA scheme for wireless sensor networks with Internet of Things8
Content‐based image retrieval for super‐resolutioned images using feature fusion: Deep learning and hand crafted8
Manipulator trajectory tracking based on adaptive sliding mode control8
An efficient algorithm for link prediction based on local information: Considering the effect of node degree8
Adapted smart home services based on smart contracts and service level agreements8
0.059836149215698