Subjects -> COMPUTER SCIENCE (Total: 2313 journals)
    - ANIMATION AND SIMULATION (33 journals)
    - ARTIFICIAL INTELLIGENCE (133 journals)
    - AUTOMATION AND ROBOTICS (116 journals)
    - CLOUD COMPUTING AND NETWORKS (75 journals)
    - COMPUTER ARCHITECTURE (11 journals)
    - COMPUTER ENGINEERING (12 journals)
    - COMPUTER GAMES (23 journals)
    - COMPUTER PROGRAMMING (25 journals)
    - COMPUTER SCIENCE (1305 journals)
    - COMPUTER SECURITY (59 journals)
    - DATA BASE MANAGEMENT (21 journals)
    - DATA MINING (50 journals)
    - E-BUSINESS (21 journals)
    - E-LEARNING (30 journals)
    - ELECTRONIC DATA PROCESSING (23 journals)
    - IMAGE AND VIDEO PROCESSING (42 journals)
    - INFORMATION SYSTEMS (109 journals)
    - INTERNET (111 journals)
    - SOCIAL WEB (61 journals)
    - SOFTWARE (43 journals)
    - THEORY OF COMPUTING (10 journals)

COMPUTER SCIENCE (1305 journals)            First | 1 2 3 4 5 6 7 | Last

Showing 201 - 400 of 872 Journals sorted alphabetically
Computational Ecology and Software     Open Access   (Followers: 9)
Computational Economics     Hybrid Journal   (Followers: 12)
Computational Geosciences     Hybrid Journal   (Followers: 17)
Computational Linguistics     Open Access   (Followers: 23)
Computational Management Science     Hybrid Journal  
Computational Mathematics and Modeling     Hybrid Journal   (Followers: 8)
Computational Mechanics     Hybrid Journal   (Followers: 11)
Computational Methods and Function Theory     Hybrid Journal  
Computational Molecular Bioscience     Open Access   (Followers: 1)
Computational Optimization and Applications     Hybrid Journal   (Followers: 9)
Computational Particle Mechanics     Hybrid Journal   (Followers: 1)
Computational Science and Techniques     Open Access  
Computational Statistics     Hybrid Journal   (Followers: 15)
Computational Statistics & Data Analysis     Hybrid Journal   (Followers: 34)
Computational Toxicology     Hybrid Journal  
Computer     Full-text available via subscription   (Followers: 141)
Computer Aided Surgery     Open Access   (Followers: 5)
Computer Applications in Engineering Education     Hybrid Journal   (Followers: 6)
Computer Communications     Hybrid Journal   (Followers: 19)
Computer Engineering and Applications Journal     Open Access   (Followers: 8)
Computer Journal     Hybrid Journal   (Followers: 7)
Computer Methods in Applied Mechanics and Engineering     Hybrid Journal   (Followers: 26)
Computer Methods in Biomechanics and Biomedical Engineering     Hybrid Journal   (Followers: 10)
Computer Methods in Biomechanics and Biomedical Engineering : Imaging & Visualization     Hybrid Journal  
Computer Music Journal     Hybrid Journal   (Followers: 18)
Computer Physics Communications     Hybrid Journal   (Followers: 9)
Computer Science - Research and Development     Hybrid Journal   (Followers: 7)
Computer Science and Engineering     Open Access   (Followers: 15)
Computer Science and Information Technology     Open Access   (Followers: 12)
Computer Science Education     Hybrid Journal   (Followers: 16)
Computer Science Journal     Open Access   (Followers: 20)
Computer Science Review     Hybrid Journal   (Followers: 12)
Computer Standards & Interfaces     Hybrid Journal   (Followers: 3)
Computer Supported Cooperative Work (CSCW)     Hybrid Journal   (Followers: 8)
Computer-aided Civil and Infrastructure Engineering     Hybrid Journal   (Followers: 9)
Computer-Aided Design and Applications     Hybrid Journal   (Followers: 6)
Computers     Open Access   (Followers: 2)
Computers & Chemical Engineering     Hybrid Journal   (Followers: 12)
Computers & Education     Hybrid Journal   (Followers: 92)
Computers & Electrical Engineering     Hybrid Journal   (Followers: 8)
Computers & Geosciences     Hybrid Journal   (Followers: 30)
Computers & Mathematics with Applications     Full-text available via subscription   (Followers: 9)
Computers & Structures     Hybrid Journal   (Followers: 44)
Computers & Education Open     Open Access   (Followers: 3)
Computers & Industrial Engineering     Hybrid Journal   (Followers: 6)
Computers and Composition     Hybrid Journal   (Followers: 11)
Computers and Education: Artificial Intelligence     Open Access   (Followers: 4)
Computers and Electronics in Agriculture     Hybrid Journal   (Followers: 7)
Computers and Geotechnics     Hybrid Journal   (Followers: 13)
Computers in Biology and Medicine     Hybrid Journal   (Followers: 10)
Computers in Entertainment     Hybrid Journal  
Computers in Human Behavior Reports     Open Access  
Computers in Industry     Hybrid Journal   (Followers: 7)
Computers in the Schools     Hybrid Journal   (Followers: 8)
Computers, Environment and Urban Systems     Hybrid Journal   (Followers: 11)
Computerworld Magazine     Free   (Followers: 2)
Computing     Hybrid Journal   (Followers: 2)
Computing and Software for Big Science     Hybrid Journal   (Followers: 1)
Computing and Visualization in Science     Hybrid Journal   (Followers: 6)
Computing in Science & Engineering     Full-text available via subscription   (Followers: 31)
Computing Reviews     Full-text available via subscription   (Followers: 1)
Concurrency and Computation: Practice & Experience     Hybrid Journal  
Connection Science     Open Access  
Control Engineering Practice     Hybrid Journal   (Followers: 46)
Cryptologia     Hybrid Journal   (Followers: 3)
CSI Transactions on ICT     Hybrid Journal   (Followers: 2)
Cuadernos de Documentación Multimedia     Open Access  
Current Science     Open Access   (Followers: 116)
Cyber-Physical Systems     Hybrid Journal  
Cyberspace : Jurnal Pendidikan Teknologi Informasi     Open Access  
DAIMI Report Series     Open Access  
Data     Open Access   (Followers: 4)
Data & Policy     Open Access   (Followers: 3)
Data Science and Engineering     Open Access   (Followers: 6)
Data Technologies and Applications     Hybrid Journal   (Followers: 217)
Data-Centric Engineering     Open Access   (Followers: 1)
Datenbank-Spektrum     Hybrid Journal   (Followers: 1)
Datenschutz und Datensicherheit - DuD     Hybrid Journal  
Decision Analytics     Open Access   (Followers: 3)
Decision Support Systems     Hybrid Journal   (Followers: 13)
Design Journal : An International Journal for All Aspects of Design     Hybrid Journal   (Followers: 33)
Digital Biomarkers     Open Access   (Followers: 1)
Digital Chemical Engineering     Open Access  
Digital Chinese Medicine     Open Access  
Digital Creativity     Hybrid Journal   (Followers: 11)
Digital Experiences in Mathematics Education     Hybrid Journal   (Followers: 3)
Digital Finance : Smart Data Analytics, Investment Innovation, and Financial Technology     Hybrid Journal   (Followers: 3)
Digital Geography and Society     Open Access  
Digital Government : Research and Practice     Open Access   (Followers: 1)
Digital Health     Open Access   (Followers: 10)
Digital Journalism     Hybrid Journal   (Followers: 8)
Digital Medicine     Open Access   (Followers: 3)
Digital Platform: Information Technologies in Sociocultural Sphere     Open Access   (Followers: 1)
Digital Policy, Regulation and Governance     Hybrid Journal   (Followers: 2)
Digital War     Hybrid Journal   (Followers: 2)
Digitale Welt : Das Wirtschaftsmagazin zur Digitalisierung     Hybrid Journal  
Digitális Bölcsészet / Digital Humanities     Open Access   (Followers: 2)
Disaster Prevention and Management     Hybrid Journal   (Followers: 30)
Discours     Open Access   (Followers: 1)
Discourse & Communication     Hybrid Journal   (Followers: 26)
Discover Internet of Things     Open Access   (Followers: 2)
Discrete and Continuous Models and Applied Computational Science     Open Access  
Discrete Event Dynamic Systems     Hybrid Journal   (Followers: 3)
Discrete Mathematics & Theoretical Computer Science     Open Access   (Followers: 1)
Discrete Optimization     Full-text available via subscription   (Followers: 7)
Displays     Hybrid Journal  
Distributed and Parallel Databases     Hybrid Journal   (Followers: 2)
e-learning and education (eleed)     Open Access   (Followers: 40)
Ecological Indicators     Hybrid Journal   (Followers: 22)
Ecological Informatics     Hybrid Journal   (Followers: 3)
Ecological Management & Restoration     Hybrid Journal   (Followers: 15)
Ecosystems     Hybrid Journal   (Followers: 33)
Edu Komputika Journal     Open Access   (Followers: 1)
Education and Information Technologies     Hybrid Journal   (Followers: 53)
Educational Philosophy and Theory     Hybrid Journal   (Followers: 10)
Educational Psychology in Practice: theory, research and practice in educational psychology     Hybrid Journal   (Followers: 13)
Educational Research and Evaluation: An International Journal on Theory and Practice     Hybrid Journal   (Followers: 7)
Educational Theory     Hybrid Journal   (Followers: 9)
Egyptian Informatics Journal     Open Access   (Followers: 5)
Electronic Commerce Research and Applications     Hybrid Journal   (Followers: 5)
Electronic Design     Partially Free   (Followers: 125)
Electronic Letters on Computer Vision and Image Analysis     Open Access   (Followers: 10)
Elektron     Open Access  
Empirical Software Engineering     Hybrid Journal   (Followers: 8)
Energy for Sustainable Development     Hybrid Journal   (Followers: 13)
Engineering & Technology     Hybrid Journal   (Followers: 23)
Engineering Applications of Computational Fluid Mechanics     Open Access   (Followers: 23)
Engineering Computations     Hybrid Journal   (Followers: 3)
Engineering Economist, The     Hybrid Journal   (Followers: 4)
Engineering Optimization     Hybrid Journal   (Followers: 19)
Engineering With Computers     Hybrid Journal   (Followers: 5)
Enterprise Information Systems     Hybrid Journal   (Followers: 2)
Entertainment Computing     Hybrid Journal   (Followers: 2)
Environmental and Ecological Statistics     Hybrid Journal   (Followers: 7)
Environmental Communication: A Journal of Nature and Culture     Hybrid Journal   (Followers: 16)
EPJ Data Science     Open Access   (Followers: 10)
ESAIM: Control Optimisation and Calculus of Variations     Open Access   (Followers: 2)
Ethics and Information Technology     Hybrid Journal   (Followers: 64)
eTransportation     Open Access   (Followers: 1)
EURO Journal on Computational Optimization     Open Access   (Followers: 5)
EuroCALL Review     Open Access  
European Food Research and Technology     Hybrid Journal   (Followers: 8)
European Journal of Combinatorics     Full-text available via subscription   (Followers: 3)
European Journal of Computational Mechanics     Hybrid Journal   (Followers: 1)
European Journal of Information Systems     Hybrid Journal   (Followers: 87)
European Journal of Law and Technology     Open Access   (Followers: 19)
European Journal of Political Theory     Hybrid Journal   (Followers: 27)
Evolutionary Computation     Hybrid Journal   (Followers: 11)
Fibreculture Journal     Open Access   (Followers: 9)
Finite Fields and Their Applications     Full-text available via subscription   (Followers: 5)
Fixed Point Theory and Applications     Open Access  
Focus on Catalysts     Full-text available via subscription  
Focus on Pigments     Full-text available via subscription   (Followers: 3)
Focus on Powder Coatings     Full-text available via subscription   (Followers: 5)
Forensic Science International: Digital Investigation     Full-text available via subscription   (Followers: 318)
Formal Aspects of Computing     Hybrid Journal   (Followers: 3)
Formal Methods in System Design     Hybrid Journal   (Followers: 6)
Forschung     Hybrid Journal   (Followers: 1)
Foundations and Trends® in Communications and Information Theory     Full-text available via subscription   (Followers: 6)
Foundations and Trends® in Databases     Full-text available via subscription   (Followers: 2)
Foundations and Trends® in Human-Computer Interaction     Full-text available via subscription   (Followers: 5)
Foundations and Trends® in Information Retrieval     Full-text available via subscription   (Followers: 30)
Foundations and Trends® in Networking     Full-text available via subscription   (Followers: 1)
Foundations and Trends® in Signal Processing     Full-text available via subscription   (Followers: 7)
Foundations and Trends® in Theoretical Computer Science     Full-text available via subscription   (Followers: 1)
Foundations of Computational Mathematics     Hybrid Journal  
Foundations of Computing and Decision Sciences     Open Access  
Frontiers in Computational Neuroscience     Open Access   (Followers: 23)
Frontiers in Computer Science     Open Access   (Followers: 1)
Frontiers in Digital Health     Open Access   (Followers: 4)
Frontiers in Digital Humanities     Open Access   (Followers: 7)
Frontiers in ICT     Open Access  
Frontiers in Neuromorphic Engineering     Open Access   (Followers: 2)
Frontiers in Research Metrics and Analytics     Open Access   (Followers: 4)
Frontiers of Computer Science in China     Hybrid Journal   (Followers: 2)
Frontiers of Environmental Science & Engineering     Hybrid Journal   (Followers: 3)
Frontiers of Information Technology & Electronic Engineering     Hybrid Journal  
Fuel Cells Bulletin     Full-text available via subscription   (Followers: 9)
Functional Analysis and Its Applications     Hybrid Journal   (Followers: 3)
Future Computing and Informatics Journal     Open Access  
Future Generation Computer Systems     Hybrid Journal   (Followers: 2)
Geo-spatial Information Science     Open Access   (Followers: 7)
Geoforum Perspektiv     Open Access   (Followers: 1)
GeoInformatica     Hybrid Journal   (Followers: 7)
Geoinformatics FCE CTU     Open Access   (Followers: 8)
GetMobile : Mobile Computing and Communications     Full-text available via subscription   (Followers: 1)
Government Information Quarterly     Hybrid Journal   (Followers: 28)
Granular Computing     Hybrid Journal  
Graphics and Visual Computing     Open Access  
Grey Room     Hybrid Journal   (Followers: 16)
Group Dynamics : Theory, Research, and Practice     Full-text available via subscription   (Followers: 15)
Groups, Complexity, Cryptology     Open Access   (Followers: 2)
HardwareX     Open Access  
Harvard Data Science Review     Open Access   (Followers: 3)
Health Services Management Research     Hybrid Journal   (Followers: 16)
Healthcare Technology Letters     Open Access  
High Frequency     Hybrid Journal  
High-Confidence Computing     Open Access   (Followers: 1)
Home Cultures     Full-text available via subscription   (Followers: 7)
Home Health Care Management & Practice     Hybrid Journal   (Followers: 1)

  First | 1 2 3 4 5 6 7 | Last

Similar Journals
Journal Cover
Computing
Journal Prestige (SJR): 0.414
Citation Impact (citeScore): 2
Number of Followers: 2  
 
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 1436-5057 - ISSN (Online) 0010-485X
Published by Springer-Verlag Homepage  [2469 journals]
  • A framework for modeling and executing task-Specific resource allocations
           in business processes

    • Free pre-print version: Loading...

      Abstract: Abstract As resources are valuable assets, organizations have to decide which resources to allocate to business process tasks in a way that the process is executed not only effectively but also efficiently. Traditional role-based resource allocation leads to effective process executions, since each task is performed by a resource that has the required skills and competencies to do so. However, the resulting allocations are typically not as efficient as they could be, since optimization techniques have yet to find their way in traditional business process management scenarios. On the other hand, operations research provides a rich set of analytical methods for supporting problem-specific decisions on resource allocation. This paper provides a novel framework for creating transparency on existing tasks and resources, supporting individualized allocations for each activity in a process, and the possibility to integrate problem-specific analytical methods of the operations research domain. To validate the framework, the paper reports on the design and prototypical implementation of a software architecture, which extends a traditional process engine with a dedicated resource management component. This component allows us to define specific resource allocation problems at design time, and it also facilitates optimized resource allocation at run time. The framework is evaluated using a real-world parcel delivery process. The evaluation shows that the quality of the allocation results increase significantly with a technique from operations research in contrast to the traditional applied rule-based approach.
      PubDate: 2022-06-17
       
  • Efficient DNN training based on backpropagation parallelization

    • Free pre-print version: Loading...

      Abstract: Abstract Pipeline parallelism is an efficient way to speed up the training of deep neural networks (DNNs) by partitioning the model and pipelining the training process across a cluster of workers in distributed systems. In this paper, we propose a new pipeline parallelization approach (Q-FB pipeline) for distributed deep learning, which can achieve both high training speed and high hardware utilization. The major novelty of Q-FB pipeline lies in a mechanism that can parallelize the backpropagation training without loss of precision. Since the parameters update of the backward phase depends on the error calculated in the forward phase, paralleling the backpropagation process naively will hurt the model’s convergence behaviour. To provide convergence guarantees, Q-FB pipeline lets the forward phase and backward phase execute in parallel on different processors with the techniques of shared model memory and accumulated gradients update. To overcome the communication bottleneck, Q-FB pipeline compresses both activations and gradients before transferring them to other workers. We adopt an activation quantization scheme for reducing traffic in the forward phase and propose a gradient compression algorithm (2-Step GC algorithm) for reducing communication costs in the backward phase. Experiments at both small and large computing clusters (e.g. Tianhe-2 supercomputer system) show that Q-FB pipeline can effectively accelerate the training process without loss in convergence or precision.
      PubDate: 2022-06-17
       
  • Quantifiability: a concurrent correctness condition modeled in vector
           space

    • Free pre-print version: Loading...

      Abstract: Abstract Architectural imperatives due to the slowing of Moore’s Law, the broad acceptance of relaxed semantics and the O(n!) worst case verification complexity of generating sequential histories motivate a new approach to concurrent correctness. Desiderata for a new correctness condition are that it be independent of sequential histories, compositional, flexible as to timing, modular as to semantics and free of inherent locking or waiting. We propose Quantifiability, a novel correctness condition that models a system in vector space to launch a new mathematical analysis of concurrency. The vector space model is suitable for a wide range of concurrent systems and their associated data structures. This paper formally defines quantifiability and demonstrates that quantifiability is compositional and non-blocking and that it implies observational refinement. Analysis is facilitated with linear algebra, better supported and of much more efficient time complexity than traditional combinatorial methods.
      PubDate: 2022-06-07
       
  • Trust on wheels: Towards secure and resource efficient IoV networks

    • Free pre-print version: Loading...

      Abstract: Abstract The emerging yet promising paradigm of Internet-of-Vehicles (IoV) has received considerable attention in the recent years as an integral and indispensable constituent of the modern intelligent transportation systems, wherein safety-critical information is exchanged amongst the connected vehicles via a high-bandwidth, low-latent vehicle-to-everything communication system so as to ensure road safety and highly efficient traffic flows. Therefore, it is of utmost importance to ensure the authenticity and reliability of such safety messages together with the legitimacy of the vehicles disseminating the same. This necessitates instituting a state-of-the-art trust-based mechanism in order to not only identify but to further evict the malicious vehicles from an IoV network. The risk augments if a malicious vehicle (via its malign attempts) assume the role of a cluster head in a cluster, thereby jeopardizing the safety of both the occupants of the vehicles and vulnerable pedestrians. Hence, intelligent algorithms with a potential to opt for both a trusted and a resource efficient cluster head needs to be put into place to guarantee the overall security and resource efficacy of the corresponding cluster. Accordingly, in this paper, we have envisaged a scalable hybrid trust-based model which introduces a composite metric encompassing the weighted amalgamation of a vehicle’s computed trust score and its corresponding available resources in order to ensure that the stringent performance requirements of the safety-critical vehicular applications are fully met. A Hungarian algorithm-based role assignment mechanism has been subsequently envisaged for the selection of an optimal cluster head, proxy cluster head, and followers amongst the members of a vehicular cluster for maximizing its overall efficacy. Furthermore, the notion of an adaptive threshold has been proposed in order to identify and subsequently eliminate the smart malicious vehicles from an IoV network in a timely manner, i.e., as soon as they start exhibiting an adverse behavior, to guarantee that the network is not manipulated for any malicious gains. Extensive simulations have been carried out and performance analysis demonstrates the efficaciousness of our proposed scheme.
      PubDate: 2022-06-01
       
  • An ECC-based lightweight remote user authentication and key management
           scheme for IoT communication in context of fog computing

    • Free pre-print version: Loading...

      Abstract: Abstract Fog computing is a computing structure which is distributed in nature. Low latency, reasonably low communication overhead and ability to support real time applications are the reasons for which fog computing approach said to provide better performance than cloud computing. Although, it is an extension of the cloud computing. Fog computing also inherits some critical security and privacy issues of cloud computing. Secure key management and user authentication are among the key issues faced by fog computing. Various schemes with probable solutions of these issues have been proposed by many authors in this context. Among them, a notable scheme has been presented by Wajid et al. known as SAKA-FC, where authors used three-factor authentication with privacy preservation for remote user based on ECC, hash functions, fuzzy extractor and symmetric bivariate polynomial function. This paper analyses the SAKA-FC protocol and found that it is not resilient against fog server insider attack, message intercept attack and replay attack. Consequently, an improved, lightweight and secure authentication scheme in context of fog-centric IoT communication is proposed in this paper to eradicate all the above mentioned security shortfalls of Wajid et al scheme. The proposed scheme is verified using mathematical security analysis and simulated using AVISPA which proves that the proposed scheme prevents all pertinent security threats. The performance analysis of our scheme proves its effectiveness over other related existing schemes in this context.
      PubDate: 2022-06-01
       
  • Users opinion and emotion understanding in social media regarding COVID-19
           vaccine

    • Free pre-print version: Loading...

      Abstract: Abstract Online social platforms or social platforms such as Twitter, Facebook and Instagram have become popular platforms for a public discussion about social topics. Recent studies show that there is a growing tendency for people to talk about COVID-19 pandemic in these online channels. The rapid growth of the infected cases by COVID-19 pandemic makes a lots of anxiety and fear among people. With the recent released of Pfizer vaccine, people start posting a lot of rumors regarding the safety concerns of the vaccine, especially among the elderly people. The aim of this study is to bring out the fact that tweets containing all pertinent details about the COVID-19 vaccine and provides an analysis and understanding of users emotions regarding the recent release of COVID-19 vaccine. This study starts with the collection of tweets related to COVID-19 vaccine and then cleaning the dataset from redundant tweets. In this study, we use Twitter API and Web Scraping techniques to obtain a sample of 50,000 tweets talking about COVID-19 vaccine.Further, The analysis of users emotions is achieved by manually labeling and classifying the tweets to either positive or negative. Then, a deep learning based model is used to train the data and classify the people opinion about COVID-19 vaccine. The experimental results illustrate that high percentage of people have shown a positive attitude towards COVID1-19 vaccine. The proposed method is validated over Twitter datasets and the results also demonstrate that use of deep learning classifier can successfully improve the accuracy of people emotions analysis with an accuracy up to 98% for training set and the accuracy for testing set is 73%.
      PubDate: 2022-06-01
       
  • An efficient gray system theory-based routing protocol for energy
           consumption management in the Internet of Things using fog and cloud
           computing

    • Free pre-print version: Loading...

      Abstract: Abstract Due to the big data exchange on the Internet of Things, proper routing and selecting the best routes for fast data transmission improve network performance. There are major challenges, like high delay, when cloud computing is used. Therefore, one solution is to use other schemes, such as fog computing. In fog computing, all data is not sent to the cloud and the fog nodes close to objects are used for data processing. This reduces the network delay. In this paper, we propose an overlapping clustering method called MFCT-IoT to select the best cluster head nodes to guarantee the fast data transfer from objects to fog nodes. The selected cluster head nodes are responsible for sending the collected data to the closest fog nodes in the network edge. Upon receiving the data, the fog nodes process it, and if a response is ready, they respond immediately to the object. Otherwise, they merge and transmit the data to the cloud servers, which are considered as the root node of the proposed hierarchical tree. After processing, the merged data is sent to the object. We compare the proposed scheme with two schemes, including ERGID and EECRP. These schemes are evaluated based on various criteria, including the response time, packet delivery ratio, end-to-end delay, network lifetime, and energy consumption. The results indicate that the proposed method outperforms others in terms of all criteria.
      PubDate: 2022-06-01
       
  • Evaluation of fog application placement algorithms: a survey

    • Free pre-print version: Loading...

      Abstract: Abstract Recently, the concept of cloud computing has been extended towards the network edge. Devices near the network edge, called fog nodes, offer computing capabilities with low latency to nearby end devices. In the resulting fog computing paradigm (also called edge computing), application components can be deployed to a distributed infrastructure, comprising both cloud data centers and fog nodes. The decision which infrastructure nodes should host which application components has a large impact on important system parameters like performance and energy consumption. Several algorithms have been proposed to find a good placement of applications on a fog infrastructure. In most cases, the proposed algorithms were evaluated experimentally by the respective authors. In the absence of a theoretical analysis, a thorough and systematic empirical evaluation is of key importance for being able to make sound conclusions about the suitability of the algorithms. The aim of this paper is to survey how application placement algorithms for fog computing are evaluated in the literature. In particular, we identify good and bad practices that should be utilized respectively avoided when evaluating such algorithms.
      PubDate: 2022-06-01
       
  • Smart COVID-shield: an IoT driven reliable and automated prototype model
           for COVID-19 symptoms tracking

    • Free pre-print version: Loading...

      Abstract: Abstract IoT technology is revolutionizing healthcare and is transforming it into more personalized healthcare. In the context of COVID-19 pandemic, IoT`s intervention can help to detect its spread. This research proposes an effective “Smart COVID-Shield” that is capable of automatically detecting prevalent symptoms like fever and coughing along with ensuring social distancing norms are properly followed. It comprises three modules which include Cough Detect Module (CDM) for dry cough detection, Temperature Detect module (TDM) for high-temperature monitoring, and Distance Compute Module (DCM) to track social distancing norm violator. The device comprises a combination of a lightweight fabric suspender worn around shoulders and a flexible belt wrapped around the waist. The suspender is equipped with a passive infrared (PIR) sensor and temperature sensor to monitor persistent coughing patterns and high body temperature and the ultra-sonic sensor verify 6 feet distance for tracking an individual's social distancing norms. The developed model is implemented in an aluminum factory to verify its effectiveness. Results obtained were promising and reliable when compared to conventional manual procedures. The model accurately reported when body temperature rises. It outperformed thermal gun as it accurately recorded a mean of only 4.65 candidates with higher body temperature as compared to 8.59% with the thermal gun. A significant reduction of 3.61% on social distance violators was observed. Besides this, the latency delay of 10.32 s was manageable with the participant count of over 800 which makes it scalable.
      PubDate: 2022-06-01
       
  • Scalability and performance analysis of BDPS in clouds

    • Free pre-print version: Loading...

      Abstract: Abstract The increasing demand for big data processing leads to commercial off-the-shelf (COTS) and cloud-based big data analytics services. Giant cloud service vendors provide customized big data processing systems (BDPS), which are more cost-effective for operation and maintenance than self-owned platforms. End users can rent big data analytics services with a pay-as-you-go cost model. However, when users’ data size increases, they need to scale their rental BDPS in order to achieve approximately the same performance, such as task completion time and normalized system throughput. Unfortunately, there is no effective way to help end-users to choose between scale-up direction and scale-out direction to expand their existing rental BDPS. Moreover, there is no any metric to measure the scalability of BDPS, either. Furthermore, the performance of BDPS services at different time slots is not consistent due to co-location and workload placement policies in modern internet data centers. To this end, this paper proposes scalability metric for BDPS in clouds, which can mitigate the aforementioned issues. This scalability metric quantifies the scalability of BDPS consistently under different system expansion configurations. This paper also conducts experiments on real BDPS platforms and derives optimization approaches for better scalability of BDPS, such as file compression during Shuffle process in MapReduce. The experiment results demonstrate the validity of the proposed optimization strategies.
      PubDate: 2022-06-01
       
  • Solving dimension reduction problems for classification using Promoted
           Crow Search Algorithm (PCSA)

    • Free pre-print version: Loading...

      Abstract: Abstract In recent years, with the increasing volume of databases, the removal of redundant features has become an essential thing in classification. A smaller subset of features is selected using feature selection algorithm. One of the famous algorithms of feature selection methods is the crow search algorithm (CSA). This algorithm’s popularity can be mentioned in the algorithm’s implementation and process and the impressive results compared to the previous algorithms. Despite all these benefits, this algorithm suffers from problems such as unbalanced global and local search. It is also stuck in local optimization due to the search approach’s inadequacy. In this paper, a new algorithm based on CSA is introduced. In order to overcome the shortcoming, four fundamental changes have been made to CSA. (i) The algorithm uses the concept of dynamic awareness probability to solve the balance between exploitation and exploration. Then, a new approach is introduced for each part of the search that improves crows’ search performance both (ii) locally and (iii) globally. Also, as the last change, (iv) the concept of chaos is used to increase the algorithm’s convergence rate. The proposed method has been tested and compared with ten well-known algorithms in this field on the same datasets and has performed on average 20% better in the feature reduction index and 2.5% in the fitness index, while has a lower performance in accuracy by only 1.5%. Practical results show that the algorithm changes have provided attractive results compared to other algorithms in this field in the mentioned metrics.
      PubDate: 2022-06-01
       
  • Scalable blockchain storage systems: research progress and models

    • Free pre-print version: Loading...

      Abstract: Abstract Blockchain is believed to be able to build trust among multiple parties and improve the operational efficiency of economy and society, which is attributed to its decentralization property. However, the endless growth of Blockchain data keeps challenging the storage capacity of Blockchain nodes, compromising decentralization, and revealing the issue that the state-of-the-art storage systems of Blockchain are not scalable. From the perspective of improving the scalability of Blockchain storage systems, this paper introduces the logical and physical data structure used by Blockchain storage systems, surveys the current schemes of Blockchain storage systems in terms of the approaches to reducing data redundancy, the corresponding influence on its degree of decentralization and data reliability, and conducts quantitative analysis on data redundancy for schemes of Blockchain storage systems. The study finds that the key to realizing scalable Blockchain storage systems is to deal with the contradiction between data redundancy and its decentralization characteristic. Based on the findings, the node-based scalable model for Blockchain storage systems (SMBSS) is proposed, experimental analysis on the prototypes of the SMBSS is carried out to verify its validity, and future directions for scalable Blockchain storage systems are concluded.
      PubDate: 2022-06-01
       
  • Network structure optimization for social networks by minimizing the
           average path length

    • Free pre-print version: Loading...

      Abstract: Abstract Network structure plays an important role in the natural and social sciences. Optimization of network structure in achieving specified goals has been a major research focus. In this paper, we focus on structural optimization in terms of minimizing the network’s average path length (APL) by adding edges. We suggest a memetic algorithm to find the minimum-APL solution by adding edges. Experiments show that the proposed algorithm can solve this problem efficiently. Further, we find that APL will ultimately decrease linearly in the process of adding edges, which is affected by the network diameter.
      PubDate: 2022-06-01
       
  • Virtual machine migration policy for multi-tier application in cloud
           computing based on Q-learning algorithm

    • Free pre-print version: Loading...

      Abstract: Abstract Cloud computing technology provides shared computing which can be accessed over the Internet. When cloud data centers are flooded by end-users, how to efficiently manage virtual machines to balance both economical cost and ensure QoS becomes a mandatory work to service providers. Virtual machine migration feature brings a plenty of benefits to stakeholders such as cost, energy, performance, stability, availability. However, stakeholders’ objectives are usually conflict with each other. Furthermore, the optimal resource allocation problem in cloud infrastructure is usually NP-Hard or NP-Complete class. In this paper, the virtual migration problem is formulated by applying the game theory to ensure both load balance and resource utilization. The virtual machine migration algorithm, named V2PQL, is proposed based on Markov decision process and Q-learning algorithm. The results of the simulation demonstrate the efficiency of our proposal which are divided into training phase and extraction phase. The proposed V2PQL algorithm has been benchmarked to the Round-Robin, inverse Ant System, Max–Min Ant System, and Ant System algorithms in order to highlight its strength and feasibility in extraction phase.
      PubDate: 2022-06-01
       
  • Design of classical-quantum systems with UML

    • Free pre-print version: Loading...

      Abstract: Abstract Developers of the many promising quantum computing applications that currently exist are urging companies in many different sectors seriously consider integrating this new technology into their business. For these applications to function, not only are quantum computers required, but quantum software also. Accordingly, quantum software engineering has become an important research field, in that it attempts to apply or adapt existing methods and techniques (or propose new ones) for the analysis, design, coding, and testing of quantum software, as well as playing a key role in ensuring quality in large-scale productions. The design of quantum software nevertheless poses two main challenges: the modelling of software quantum elements must be done in high-level modelling languages; and the need to further develop so-called “hybrid information systems”, which combine quantum and classical software. To address these challenges, we first propose a quantum UML profile for analysing and designing hybrid information systems; we then demonstrate its applicability through various structural and behavioural diagrams such as use case, class, sequence, activity, and deployment. In comparison to certain other quantum domain-specific languages, this UML profile ensures compliance with a well-known international standard that is supported by many tools and is followed by an extensive community.
      PubDate: 2022-05-31
       
  • Maintaining temporal validity of real-time data in component-based systems

    • Free pre-print version: Loading...

      Abstract: Abstract How to schedule the sensor transactions to maintain the temporal validity of real-time data is an important research issue for cyber-physical systems. Current studies on sensor transaction scheduling assume that the sensor transactions are executed on a platform with continuous resource supply. This assumption does not hold for component-based systems where each component’s transactions obtain a fraction of the resources that are usually supplied by the underlying platform in a non-continuous manner. In this paper, we study the problem of scheduling sensor transactions in component-based systems. The sensor transactions are assumed to be executed in one component of the system that is deployed on a multiprocessor platform. The resource supply of each processor follows the explicit-deadline periodic (EDP) resource model. A partitioned scheduling method named PS-FC is proposed at first. It uses a sufficient and necessary condition of EDF scheduling upon an EDP resource to check the feasibility of each transaction on a processor. Then two faster partitioned scheduling methods, named PS-CI and PS-Hybrid, are proposed. PS-CI does the feasibility checks for transactions based on the candidate intervals of transaction deadlines. PS-Hybrid is a combination of PS-FC and PS-CI. The effectiveness and efficiency of the methods are evaluated through extensive experiments.
      PubDate: 2022-05-30
       
  • IoT-Gov: an IoT governance framework using the blockchain

    • Free pre-print version: Loading...

      Abstract: Abstract Internet of Things (IoT) has become an essential technology in different daily life domains including health, industry and finance among many others. The implementation of IoT systems requires different underlying technologies such as applications, network infrastructures, and different needs in terms of functionality, security, etc. The success of an IoT project is therefore a challenging task requiring a good governance where different IoT standards and tools can be synchronized and will coordinate with each other in a way every” thing” agrees upon. In this paper, we demonstrate that existing governance frameworks are not sufficient in the IoT context. Therefore, and after identifying the IoT governance requirements, we suggest a new IoT governance framework, IoT-Gov, with its proposed architecture for IoT systems and its methodological approach allowing, through a set of defined processes and algorithms, to progressively build the desired IoT system. IoT-Gov, is a new framework for modeling governance process in IoT through three layers that are: strategic objectives, Design and modeling, and Implementation. A technical conception of the proposed framework is provided using the blockchain, a technology allowing decentralization, transparence and enhancing security. To prove the feasibility of our framework, we investigate a smart parking system using constrained devices, as an example of an IoT ecosystem, and justify the suggested governance model applied to it. This model is enforced with the attribute based access control model and deployed on the Ethereum blockchain. Tests of the proposed governance model are provided. Performance results show the efficiency of this framework as well as its applicability in an IoT context.
      PubDate: 2022-05-23
       
  • On the correctness of a lock-free compression-based elastic mechanism for
           a hash trie design

    • Free pre-print version: Loading...

      Abstract: Abstract A key aspect of any hash map design is the problem of dynamically resizing it in order to deal with hash collisions. Compression in tree-based hash maps is the ability of reducing the depth of the internal hash levels that support the hash map. In this context, elasticity refers to the ability of automatically resizing the internal data structures that support the hash map operations in order to meet varying workloads, thus optimizing the overall memory consumption of the hash map. This work extends a previous lock-free hash trie map design to support elastic hashing, i.e., expand saturated hash levels and compress unused hash levels, such that, at each point in time, the number of levels in a path is adjusted, as closely as possible, to the set of keys that is stored in the data structure. To materialize our design, we introduce a new compress operation for hash levels, which requires redesigning the existing search, insert, remove and expand operations in order to maintain the lock-freedom property of the data structure. Experimental results show that elasticity effectively improves the search operation and, in doing so, our design becomes very competitive when compared to other state-of-the-art designs implemented in Java.
      PubDate: 2022-05-21
       
  • A novel routing method in hybrid DTN–MANET networks in the critical
           situations

    • Free pre-print version: Loading...

      Abstract: Abstract Maintaining desirable connections in discrete mobile ad hoc networks (MANETs) is complicated in critical situations. MANETs are often integrated with delay-tolerant networks (viz. DTNs) to achieve an optimal routing method for efficient information distribution. Since it is essential to minimize the message delivery delay rate in critical situations, this study reflects on some parameters to reduce delivery time and increase the message delivery ratio in MANET–DTN routing. Utilizing proper parameters can thus help choose a suitable relay node in the proposed routing method. Selecting a good relay is also performed based on the latest information regarding the current speed changes, the movement direction of the nodes, buffer’s free space, estimated delay, and prior knowledge of sending messages. The routing method employs a simulated annealing algorithm to optimize sending messages in the network. Besides, typical performance benchmarks, such as delivery ratio, average delivery delay, overhead, and dropped messages number, are recruited to investigate the model performance. It is concluded that the suggested routing method has better efficiency than other MANET–DTN routing protocols.
      PubDate: 2022-05-20
       
  • QoS and QoE in large Scale Wireless IoT Networks

    • Free pre-print version: Loading...

      PubDate: 2022-05-19
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 3.238.24.209
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-