Rekha Goyat, Gulshan Kumar, R. Saha, M. Conti, Reji Thomas, Tai-Hoon Kim
{"title":"RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things","authors":"Rekha Goyat, Gulshan Kumar, R. Saha, M. Conti, Reji Thomas, Tai-Hoon Kim","doi":"10.1007/s10586-023-04106-7","DOIUrl":"https://doi.org/10.1007/s10586-023-04106-7","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":" ","pages":""},"PeriodicalIF":4.4,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44311439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile","authors":"Shaoyong Li, Xueshu Hong, Yao Feng","doi":"10.1007/s10586-023-04070-2","DOIUrl":"https://doi.org/10.1007/s10586-023-04070-2","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":" ","pages":""},"PeriodicalIF":4.4,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46702275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amir Vafid Hanafi, A. Ghaffari, Hesam Rezaei, Aida Valipour, Bahman Arasteh
{"title":"Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and LSTM","authors":"Amir Vafid Hanafi, A. Ghaffari, Hesam Rezaei, Aida Valipour, Bahman Arasteh","doi":"10.1007/s10586-023-04102-x","DOIUrl":"https://doi.org/10.1007/s10586-023-04102-x","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":" ","pages":""},"PeriodicalIF":4.4,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45678809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amer A. Al-Rahayfeh, Saleh Atiewi, Muder Almiani, Mohammad Jararweh, M. Faezipour
{"title":"Utilizing 3D magnetic source imaging with landmark-based features and multi-classification for Alzheimer’s Disease diagnosis","authors":"Amer A. Al-Rahayfeh, Saleh Atiewi, Muder Almiani, Mohammad Jararweh, M. Faezipour","doi":"10.1007/s10586-023-04103-w","DOIUrl":"https://doi.org/10.1007/s10586-023-04103-w","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":" ","pages":""},"PeriodicalIF":4.4,"publicationDate":"2023-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44945706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"pHPCe: a hybrid power conservation approach for containerized HPC environment","authors":"Animesh Kuity, S. K. Peddoju","doi":"10.1007/s10586-023-04105-8","DOIUrl":"https://doi.org/10.1007/s10586-023-04105-8","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":" ","pages":""},"PeriodicalIF":4.4,"publicationDate":"2023-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45517044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sanaz Taheri-abed, Amir Masoud Eftekhari Moghadam, Mohammad Hossein Rezvani
{"title":"Machine learning-based computation offloading in edge and fog: a systematic review","authors":"Sanaz Taheri-abed, Amir Masoud Eftekhari Moghadam, Mohammad Hossein Rezvani","doi":"10.1007/s10586-023-04100-z","DOIUrl":"https://doi.org/10.1007/s10586-023-04100-z","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":"26 1","pages":"3113 - 3144"},"PeriodicalIF":4.4,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48508740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alper Ozcan, A. Kasif, I. Sezgin, C. Catal, Muhammad Sanwal, H. Merdun
{"title":"Deep learning-based modelling of pyrolysis","authors":"Alper Ozcan, A. Kasif, I. Sezgin, C. Catal, Muhammad Sanwal, H. Merdun","doi":"10.1007/s10586-023-04096-6","DOIUrl":"https://doi.org/10.1007/s10586-023-04096-6","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":" ","pages":""},"PeriodicalIF":4.4,"publicationDate":"2023-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44709070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep learning for the security of software-defined networks: a review","authors":"Roya Taheri, Habib Ahmed, Engin Arslan","doi":"10.1007/s10586-023-04069-9","DOIUrl":"https://doi.org/10.1007/s10586-023-04069-9","url":null,"abstract":"","PeriodicalId":50674,"journal":{"name":"Cluster Computing-The Journal of Networks Software Tools and Applications","volume":"26 1","pages":"3089 - 3112"},"PeriodicalIF":4.4,"publicationDate":"2023-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52191939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}