Search Results - "Concurrency and computation"

Refine Results
  1. 1

    An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols by Gupta, B.B., Quamara, Megha

    Published in Concurrency and computation (10-11-2020)
    “…Summary Understanding of any computing environment requires familiarity with its underlying technologies. Internet of Things (IoT), being a new era of…”
    Get full text
    Journal Article
  2. 2

    An under‐sampled software defect prediction method based on hybrid multi‐objective cuckoo search by Cai, Xingjuan, Niu, Yun, Geng, Shaojin, Zhang, Jiangjiang, Cui, Zhihua, Li, Jianwei, Chen, Jinjun

    Published in Concurrency and computation (10-03-2020)
    “…Summary Both the problem of class imbalance in datasets and parameter selection of Support Vector Machine (SVM) are crucial to predict software defects…”
    Get full text
    Journal Article
  3. 3

    Sentiment analysis on product reviews based on weighted word embeddings and deep neural networks by Onan, Aytuğ

    Published in Concurrency and computation (10-12-2021)
    “…Summary Sentiment analysis is one of the major tasks of natural language processing, in which attitudes, thoughts, opinions, or judgments toward a particular…”
    Get full text
    Journal Article
  4. 4

    A review of research on co‐training by Ning, Xin, Wang, Xinran, Xu, Shaohui, Cai, Weiwei, Zhang, Liping, Yu, Lina, Li, Wenfa

    Published in Concurrency and computation (15-08-2023)
    “…Summary Co‐training algorithm is one of the main methods of semi‐supervised learning in machine learning, which explores the effective information in unlabeled…”
    Get full text
    Journal Article
  5. 5

    A Gaussian error correction multi‐objective positioning model with NSGA‐II by Wang, Penghong, Huang, Jianrou, Cui, Zhihua, Xie, Liping, Chen, Jinjun

    Published in Concurrency and computation (10-03-2020)
    “…Summary Distance vector‐hop (DVHop), as a range‐independent positioning algorithm, is a significant positioning method in wireless sensor networks (WSNs). It…”
    Get full text
    Journal Article
  6. 6

    Machine learning algorithms to detect DDoS attacks in SDN by Santos, Reneilson, Souza, Danilo, Santo, Walter, Ribeiro, Admilson, Moreno, Edward

    Published in Concurrency and computation (25-08-2020)
    “…Summary Summary Software‐Defined Networking (SDN) is an emerging network paradigm that has gained significant traction from many researchers to address the…”
    Get full text
    Journal Article
  7. 7

    Detection algorithm of safety helmet wearing based on deep learning by Huang, Li, Fu, Qiaobo, He, Meiling, Jiang, Du, Hao, Zhiqiang

    Published in Concurrency and computation (10-07-2021)
    “…In the production and construction of industry, safety accidents caused by unsafe behaviors of staff often occur. In a complex construction site scene, due to…”
    Get full text
    Journal Article
  8. 8

    Image encryption based on a single‐round dictionary and chaotic sequences in cloud computing by Li, Yinghua, Yu, He, Song, Bin, Chen, Jinjun

    Published in Concurrency and computation (10-04-2021)
    “…Summary With the increasing popularity of multimedia technology and the prevalence of various smart electronic devices, severe security problems have recently…”
    Get full text
    Journal Article
  9. 9

    Internet of things in smart education environment: Supportive framework in the decision‐making process by Abdel‐Basset, Mohamed, Manogaran, Gunasekaran, Mohamed, Mai, Rushdy, Ehab

    Published in Concurrency and computation (25-05-2019)
    “…Summary The role of education, which propagates knowledge, becomes increasingly significant in the past little years due to the fulminatory expansion in…”
    Get full text
    Journal Article
  10. 10

    Chatbots: Security, privacy, data protection, and social aspects by Hasal, Martin, Nowaková, Jana, Ahmed Saghair, Khalifa, Abdulla, Hussam, Snášel, Václav, Ogiela, Lidia

    Published in Concurrency and computation (10-10-2021)
    “…Summary Chatbots are artificial communication systems becoming increasingly popular and not all their security questions are clearly solved. People use…”
    Get full text
    Journal Article
  11. 11

    Fully automatic model‐based segmentation and classification approach for MRI brain tumor using artificial neural networks by Arunkumar, N., Mohammed, Mazin Abed, Mostafa, Salama A., Ibrahim, Dheyaa Ahmed, Rodrigues, Joel J.P.C., Albuquerque, Victor Hugo C.

    Published in Concurrency and computation (10-01-2020)
    “…Summary The accuracy of brain tumor diagnosis based on medical images is greatly affected by the segmentation process. The segmentation determines the tumor…”
    Get full text
    Journal Article
  12. 12

    Multi‐view frontal face image generation: A survey by Ning, Xin, Nan, Fangzhe, Xu, Shaohui, Yu, Lina, Zhang, Liping

    Published in Concurrency and computation (15-08-2023)
    “…Face images from different perspectives reduce the accuracy of face recognition, and the generation of frontal face images is an important research topic in…”
    Get full text
    Journal Article
  13. 13

    A survey on load balancing algorithms for virtual machines placement in cloud computing by Xu, Minxian, Tian, Wenhong, Buyya, Rajkumar

    Published in Concurrency and computation (25-06-2017)
    “…Summary The emergence of cloud computing based on virtualization technologies brings huge opportunities to host virtual resource at low cost without the need…”
    Get full text
    Journal Article
  14. 14

    Deep and reinforcement learning for automated task scheduling in large‐scale cloud computing systems by Rjoub, Gaith, Bentahar, Jamal, Abdel Wahab, Omar, Saleh Bataineh, Ahmed

    Published in Concurrency and computation (10-12-2021)
    “…Summary Cloud computing is undeniably becoming the main computing and storage platform for today's major workloads. From Internet of things and Industry 4.0…”
    Get full text
    Journal Article
  15. 15

    On the Ethereum blockchain structure: A complex networks theory perspective by Ferretti, Stefano, D'Angelo, Gabriele

    Published in Concurrency and computation (25-06-2020)
    “…Summary In this paper, we analyze the Ethereum blockchain using the complex networks modeling framework. Accounts acting on the blockchain are represented as…”
    Get full text
    Journal Article
  16. 16

    A taxonomy and survey on scheduling algorithms for scientific workflows in IaaS cloud computing environments by Rodriguez, Maria Alejandra, Buyya, Rajkumar

    Published in Concurrency and computation (25-04-2017)
    “…Summary Large‐scale scientific problems are often modeled as workflows. The ever‐growing data and compute requirements of these applications has led to…”
    Get full text
    Journal Article
  17. 17

    Amplified locality‐sensitive hashing‐based recommender systems with privacy protection by Chi, Xiaoxiao, Yan, Chao, Wang, Hao, Rafique, Wajid, Qi, Lianyong

    Published in Concurrency and computation (25-06-2022)
    “…Summary With the advent of Internet of Things (IoT) age, the variety and volume of web services have been increasing at a fast speed. This often leads to…”
    Get full text
    Journal Article
  18. 18

    Wound intensity correction and segmentation with convolutional neural networks by Lu, Huimin, Li, Bin, Zhu, Junwu, Li, Yujie, Li, Yun, Xu, Xing, He, Li, Li, Xin, Li, Jianru, Serikawa, Seiichi

    Published in Concurrency and computation (25-03-2017)
    “…Summary Wound area changes over multiple weeks are highly predictive of the wound healing process. A big data eHealth system would be very helpful in…”
    Get full text
    Journal Article
  19. 19

    Multiscale fast correlation filtering tracking algorithm based on a feature fusion model by Chen, Yuantao, Wang, Jin, Liu, Songjie, Chen, Xi, Xiong, Jie, Xie, Jingbo, Yang, Kai

    Published in Concurrency and computation (10-08-2021)
    “…Summary In scenes high in visual complexity, the identification of a moving object can be affected by changes in scale and occlusion factors during the…”
    Get full text
    Journal Article
  20. 20

    Systematic literature review of sentiment analysis on Twitter using soft computing techniques by Kumar, Akshi, Jaiswal, Arunima

    Published in Concurrency and computation (10-01-2020)
    “…Summary Sentiment detection and classification is the latest fad for social analytics on Web. With the array of practical applications in healthcare, finance,…”
    Get full text
    Journal Article