Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 80, Issue 12Aug 2024Current Issue
Reflects downloads up to 12 Sep 2024Bibliometrics
research-article
A Cost-effective and Machine-learning-based method to identify and cluster redundant mutants in software mutation testing
Abstract

The quality of software test data is assessed through mutation testing. This technique involves introducing various modifications (mutants) to the original code of the program. The test data’s effectiveness, known as the test score, is quantified ...

research-article
M2BIST-SPNet: RUL prediction for railway signaling electromechanical devices
Abstract

Railway signaling electromechanical devices (RSEDs) play a pivotal role in the railway industry. Normal wear and tear of these devices occur during day-and-night operation and even progressively develop into failures. Hence, it is imperative to ...

research-article
A supervised active learning method for identifying critical nodes in IoT networks
Abstract

The energy efficiency of wireless sensor networks (WSNs) as a key feature of the Internet of Things (IoT) and fifth-generation (5G) mobile networks is determined by several key characteristics, such as hop count, user’s location, allocated power, ...

research-article
The Egyptian national HPC grid (EN-HPCG): open-source Slurm implementation from cluster to grid approach
Abstract

Recently, Egypt has recognized the pivotal role of High Performance Computing in advancing science and innovation. Additionally, Egypt realizes the importance of collaboration between different institutions and universities to consolidate their ...

research-article
A novel optimization method: wave search algorithm
Abstract

This paper proposes a novel optimization method inspired by radar technology: wave search algorithm (WSA). The WSA algorithm not only draws on radar technology for its unique algorithmic design for the first time but also uses a new initialization ...

research-article
Gradient scaling and segmented SoftMax Regression Federated Learning (GDS-SRFFL): a novel methodology for attack detection in industrial internet of things (IIoT) networks
Abstract

Industrial internet of things (IIoT) is considered as large-scale IoT-based network comprising of sensors, communication channels, and security protocols used in Industry 4.0 for diverse real-time operations. Industrial IoT (IIoT) networks are ...

research-article
Finite difference method for the Riesz space distributed-order advection–diffusion equation with delay in 2D: convergence and stability
Abstract

In this paper, we propose numerical methods for the Riesz space distributed-order advection–diffusion equation with delay in 2D. We utilize the fractional backward differential formula method of second order (FBDF2), and weighted and shifted ...

research-article
Can GPU performance increase faster than the code error rate?
Abstract

Graphics processing units (GPUs) are the reference architecture to accelerate high-performance computing applications and the training/interference of convolutional neural networks. For both these domains, performance and reliability are two of ...

research-article
Simulating stellar merger using HPX/Kokkos on A64FX on Supercomputer Fugaku
Abstract

The increasing availability of machines relying on non-GPU architectures, such as ARM A64FX in high-performance computing, provides a set of interesting challenges to application developers. In addition to requiring code portability across ...

research-article
A novel RPL defense mechanism based on trust and deep learning for internet of things
Abstract

Along with the significant growth of applications and facilities provided by the Internet of Things (IoT) in recent years, security challenges and related issues to privacy become considerable interest of researchers. On the other hand, the de ...

research-article
Unilateral protection scheme for N-qubit GHZ states against decoherence: a resource-efficient approach
Abstract

In this paper, we propose a novel protection scheme for N-qubit Greenberger–Horne–Zeilinger (GHZ) states against amplitude damping noise, using unilateral operations. The key innovation lies in the implementation of local operations on a single ...

research-article
SPD-YOLOv8: an small-size object detection model of UAV imagery in complex scene
Abstract

Traditional camera sensors rely on human observation. However, in complex scenes, people often experience fatigue when observing objects of various sizes. Moreover, human cognitive abilities have inherent limitations, leading to potential judgment ...

research-article
FCNet: a deep neural network based on multi-channel feature cascading for image denoising
Abstract

A lot of current work based on convolutional neural networks (CNNs) has fetched good visual results on AWGN (additive white Gaussian noise) removal. However, ordinary neural networks are unable to recover detailed information for complex tasks, ...

research-article
ACANet: attention-based context-aware network for infrared small target detection
Abstract

Small infrared targets in complex backgrounds are easily obscured by a large amount of clutter, so highly discriminative features are needed to distinguish them from the cluttered background. Even if the expansion factor is increased, methods ...

research-article
Clustering-assisted gradient-based optimizer for scheduling parallel cloud workflows with budget constraints
Abstract

Cloud computing has gradually become one of the most popular platforms for executing scientific applications due to its elastic and on-demand resource provisional capabilities. But, how to effectively schedule a set of parallel workflows to ...

research-article
Design of a multilayer reversible ALU in QCA technology
Abstract

A promising alternative for the CMOS technology is the Quantum-dot Cellular Automata (QCA) technology. In this technology, the low-latency, ultra-dense, and low-power consumption digital circuits are designed. Until now, many digital circuits are ...

research-article
A deep learning mechanism to detect phishing URLs using the permutation importance method and SMOTE-Tomek link
Abstract

In contemporary times, the proliferation of phishing attacks presents a substantial and growing challenge to cybersecurity. This fraudulent tactic is designed to deceive unsuspecting individuals, enticing them to access malicious websites and ...

research-article
Performance evaluation of Word2vec accelerators exploiting spatial and temporal parallelism on DDR/HBM-based FPGAs
Abstract

Word embedding is a technique for representing words as vectors in a way that captures their semantic and syntactic relationships. The processing time of one of the most popular word embedding technique Word2vec is very large due to the huge data ...

research-article
A deep learning-based approach for predicting in-flight estimated time of arrival
Abstract

Predictability is key for efficient and safe air traffic management. In particular, accurately estimating time of arrival for current passenger flights may help terminal controllers to plan ahead and optimize airport operations in terms of safety ...

research-article
On the computation of the gradient in implicit neural networks
Abstract

Implicit neural networks and the related deep equilibrium models are investigated. To train these networks, the gradient of the corresponding loss function should be computed. Bypassing the implicit function theorem, we develop an explicit ...

research-article
MS-HRNet: multi-scale high-resolution network for human pose estimation
Abstract

Human pose estimation has important applications in medical diagnosis (such as early diagnosis of autism in children and assisting with the diagnosis of Parkinson’s disease), human-computer interaction, animation, and other fields. Currently, many ...

research-article
Post-quantum security design for hierarchical healthcare systems based on lattices
Abstract

The need for high-quality healthcare services increases to more incredible speeds. Smart healthcare offers an ecosystem of IoT wireless networks, computers and software applications to enable medical tracking, mobility and emergency services ...

research-article
Order structure analysis of node importance based on the temporal inter-layer neighborhood homogeneity rate of the dynamic network
Abstract

The analysis of node order structure in dynamic temporal networks is significant for network propagation control. To further accurately characterize the inter-layer coupling relationship of dynamic temporal networks, this paper firstly defines the ...

research-article
Cleaner fish optimization algorithm: a new bio-inspired meta-heuristic optimization algorithm
Abstract

This paper proposes a new meta-heuristic optimization algorithm called Cleaner Fish Optimization algorithm (CFO) inspired by cleaner fish. The CFO simulates the movement behavior of cleaner fish when performing “cleaning services" and the behavior ...

research-article
An enhanced object detection network for ship target detection in SAR images
Abstract

Deep learning techniques have made significant advancements in computer vision. The YOLO algorithm, a representative single-stage detection approach, has demonstrated remarkable results in detecting ship targets in SAR images. We introduce an ...

research-article
TS-Finder: privacy enhanced web crawler detection model using temporal–spatial access behaviors
Abstract

Web crawler detection is critical for preventing unauthorized extraction of valuable information from websites. Current methods rely on heuristics, leading to time-consuming processes and inability to detect novel crawlers. Privacy protection and ...

research-article
FGCF: fault-aware green computing framework in software-defined social internet of vehicle
Abstract

The social internet of vehicle (SIoV) is a specialized network combining intelligent sensing devices and vehicular communications to address traffic monitoring and resource management challenges in smart cities. Ensuring efficient and sustainable ...

research-article
HyperTuner: a cross-layer multi-objective hyperparameter auto-tuning framework for data analytic services
Abstract

Hyperparameters optimization (HPO) is vital for machine learning models. Besides model accuracy, other tuning intentions such as model training time and energy consumption are also worthy of attention from data analytic service providers. ...

research-article
An effective spatial join method for blockchain-based geospatial data using hierarchical quadrant spatial LSM+ tree
Abstract

The prevention of forgery and alternation of important data of blockchain technology is contributing widely to the expanding usage of this technology to areas and industries such as real estate and agriculture. Despite the high utilization of the ...

research-article
Enhancing learning environments with IoT: a novel decision-making approach using probabilistic linguistic T-spherical fuzzy set
Abstract

The Internet of Things is a system of networked devices that can gather, process, and share data through the Internet. The Internet of Things has vast potential to spread widely across various aspects of our lives. The educational process model is ...

Comments