Practice and Experience, Volume 21 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches


Scalable Computing: Practice and Experience, Volume 21

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 21, Number 1, 2020
Introduction to the Special Issue

J. N. Swaminathan, Gopi Ram
, Sureka Lanka:
Introduction to the Special Issue on Role of Scalable Computing and Data Analytics in Evolution of Internet of Things. 1-2
Special Issue Papers

Suresh Mundru
, K. Meena
:
An Ensemble Integrated Security System with Cross Breed Algorithm. 11-15

S. Shahidha Banu, N. Maheswari
:
Background Modelling using a Q-Tree Based Foreground Segmentation. 17-31

Agalya Rajendran
, Muthaiah Rajappa
:
Topological Ordering Signal Selection Technique for Internet of Things based on Combinational Gate for Visibility Enhancement. 33-40

A. Karthikeyan
, P. G. Kuppusamy, Iraj S. Amiri:
Secured Identity Based Cryptosystem Approach for Intelligent Routing Protocol in VANET. 41-46

K. Indragandhi, P. K. Jawahar
:
An Application based Efficient Thread Level Parallelism Scheme on Heterogeneous Multicore Embedded System for Real Time Image Processing. 47-56

Putta Venkata Subbaiah, Hima Deepthi Vankayalapati
:
A Study to Analyze Enhancement Techniques on Sound Quality for Bone Conduction and Air Conduction Speech Processing. 57-62

P. G. Kuppusamy, K. C. Ramya
, S. Sheebha Rani, M. Sivaram, Dhasarathan Vigneswaran
:
A Novel Approach Based on Modified Cycle Generative Adversarial Networks for Image Steganography. 63-72

K. Jairam Naik, D. Hanumanth Naik:
Minimizing Deadline Misses and Total Run-time with Load Balancing for a Connected Car Systems in Fog Computing. 73-84

D. Antony Joseph Rajan, E. R. Naganathan:
Long and Strong Security using Reputation and ECC for Cloud Assisted Wireless Sensor Networks. 85-92

A. Karthikeyan
, S. Pavithra, P. M. Anu:
Detection and Classification of 2D and 3D Hyper Spectral Image using Enhanced Harris Corner Detector. 93-100

A. Rengarajan, M. Mohammed Thaha:
SPCACF: Secured Privacy-Conserving Authentication Scheme using Cuckoo Filter in VANET. 101-105

R. Mahesh Prabhu
, M. S. Hema
, Srilatha Chepure, M. Nageswara Guptha
:
Logistics Optimization in Supply Chain Management using Clustering Algorithms. 107-114

G. Jayanthi, Latha Parthiban
:
Acoustic Feedback Cancellation in Efficient Hearing Aids using Genetic Algorithm. 115-125

S. Kusuma
, J. Divya Udayan
:
Analysis on Deep Learning methods for ECG based Cardiovascular Disease prediction. 127-136

D. Rajalakshmi
, K. Meena
:
A Hybrid Intrusion Detection System for Mobile Adhoc Networks using FBID Protocol. 137-145
Research Papers

Fred Thomas Tracy, Jodi L. Ryder
, Martin T. Schultz, Ghada S. Ellithy, Benjamin R. Breland, T. Chris Massey, Maureen K. Corcoran:
Monte Carlo Simulations of Coupled Transient Seepage Flow and Soil Deformation in Levees. 147-156
Volume 21, Number 2, 2020
Special Issue Papers

Praveen Dhyani, Binu D:
Introduction to the Special Issue on Intelligence on Scalable computing for Recent Applications. 157-158

Nithiya Baskaran, Eswari Rajagopal:
CPU-Memory Aware VM Consolidation for Cloud Data Centers. 159-172

Suvarna Nandyal, Suvarna Laxmikant Kattimani:
Bird Swarm Optimization-based Stacked Autoencoder Deep Learning for Umpire Detection and Classification. 173-188

Neelima Gullipalli, Sireesha Rodda:
Enhanced DBSCAN with Hierarchical Tree for Web Rule Mining. 189-202

Dipali K. Shende, S. S. Sonavane, Yogesh Angal:
A Comprehensive Survey of the Routing Schemes for IoT applications. 203-216

Reshma V. K
, R. S. Vinod Kumar
, Shahi D, Shyjith M. B:
Chicken-Moth Search Optimization-based Deep Convolutional Neural Network for Image Steganography. 217-232

Manas Ranjan Lenka, Amulya Ratna Swain:
An Efficient Dynamic Slot Scheduling Algorithm for WSN MAC: A Distributed Approach. 233-245

Talabattula Viswanadham, Rajesh Kumar P.:
Artefacts Removal from ECG Signal: Dragonfly Optimization-based Learning Algorithm for Neural Network-enhanced Adaptive Filtering. 247-263

Balasaheb H. Patil, P. M. Patil:
A Comprehensive Review on State-of-the-Art Image Inpainting Techniques. 265-276

Halima Sadia, Mohib Ullah
, Tariq Hussain
, Nida Gul, Muhammad Farooq Hussain, Nauman ul Haq, Abu Bakar:
An Efficient Way of Finding Polarity of Roman Urdu Reviews by using Boolean Rules. 277-289

Meena Zenith N, R. Radhika:
Forecasting the Impact of Social Media Advertising among College Students using Higher Order Statistical Functions. 291-307
Research Papers

Abdelkader Aroui, Abou El Hassan Benyamina, Pierre Boulet, Mohammed kamel Benhaoua, Amit Kumar Singh:
Novel Metric for Load Balance and Congestion Reducing in Network on-Chip. 309-321

Valery Mochalov, Gennady Linets, Natalia Bratchenko
, Svetlana V. Govorova:
An Analytical Model of a Corporate Software-Controlled Network Switch. 337-346
Volume 21, Number 3, 2020
Special Issue Papers

Anand Nayyar, Pijush Kanti Dutta Pramanik, Rajni Mohana:
Introduction to the Special Issue on Evolving IoT and Cyber-Physical Systems: Advancements, Applications, and Solutions. 347-348

Vivek Kumar Prasad, Madhuri D. Bhavsar:
Monitoring and Prediction of SLA for IoT based Cloud. 349-358

Pooja Jain, Neha R. Kasture, Tapan Kumar Jain:
Comparative Study of Speaker Recognition Techniques in IoT Devices for Text Independent Negative Recognition. 359-368

Mahesh Kumar Singh
, Om Prakash Rishi:
Event driven Recommendation System for E-commerce using Knowledge based Collaborative Filtering Technique. 369-378

Houssam Benbrahim, Hanaa Hachimi
, Aouatif Amine:
Deep Convolutional Neural Network with TensorFlow and Keras to Classify Skin Cancer Images. 379-390

Madhavi Devi B, Smriti Agrawal, Ramisetty Rajeshwara Rao:
Deadlock Free Resource Management Technique for IoT-Based Post Disaster Recovery Systems. 391-406

Gaurav Deep, Jagpreet Sidhu, Rajni Mohana:
Access Management of User and Cyber-Physical Device in DBaaS according to Indian IT Laws using Blockchain. 407-424

Sumit Kumar
, Jaspreet Singh:
Internet of Vehicles over Vanets: Smart and Secure Communication using IoT. 425-440

Harshal Deore, Akshat Agrawal
, Vivek Jaglan, Pooja Nagpal, Mayank Mohan Sharma:
A New Approach for Navigation and Traffic Signs Indication Using Map Integrated Augmented Reality for Self-Driving Cars. 441-450

Indu Bhardwaj
, Sibaram Khara, Priestly Shan:
A Framework to Systematically Analyse the Trustworthiness of Nodes for Securing IoV Interactions. 451-462

Saniya Zahoor, Roohie Naaz Mir:
A Parallelization based Data Management Framework for Pervasive IoT Applications. 463-477

Ujas Patel, Sudeep Tanwar
, Anuja Nair:
Performance Analysis of Video On-demand and Live Video Streaming using Cloud based Services. 479-496

Saniya Zahoor, Roohie Naaz Mir:
Design and Modeling of Resource-constrained IoT based Body Area Networks. 497-514

Neelam Saleem Khan, Mohammad Ahsan Chishti:
Security Challenges in Fog and IoT, Blockchain Technology and Cell Tree Solutions: A Review. 515-542

Neha Bhadwal, Prateek Agrawal, Vishu Madaan:
A Machine Translation System from Hindi to Sanskrit Language using Rule based Approach. 543-554
Research Papers

Anshu Kumar Dwivedi
, Awadesh K. Sharma:
NEEF: A Novel Energy Efficient Fuzzy Logic based Clustering Protocol for Wireless Sensor Network. 555-568
Volume 21, Number 4, 2020
Special Issue Papers

Sudhakar Sengan, Vijayakumar Varadarajan, Sujatha Krishnamoorthy, Gunasekaran S, C. Sathiya Kumar, Saravanan Palani, Subramaniyaswamy Vairavasundaram:
Investigation on Agricultural Land Selection using Hybrid Fuzzy Logic System. 569-582

Syamasudha Veeragandham, H. Santhi:
A Review on the Role of Machine Learning in Agriculture. 583-589

Syed Muzamil Basha, Dharmendra Singh Rajput, Janet J, Ramasubbareddy Somula, Sajeev Ram
:
Principles and Practices of Making Agriculture Sustainable: Crop Yield prediction using Random Forest. 591-599

Malathi V., M. P. Gopinath:
Noise Deduction in Novel Paddy Data Repository using Filtering Techniques. 601-610

Manjunatha S., B. Annappa
:
Real-time Big Data Analytics Framework with Data Blending Approach for Multiple Data sources in Smart City Applications. 611-623

Anandhakrishnan T, Jaisakthi S. M. Murugaiyan:
Identification of Tomato Leaf Disease Detection using Pretrained Deep Convolutional Neural Network Models. 625-635
Research Papers

Chirine Bassil, Hussein El Ghor, Jawad Khalife, Nizar Hamadeh:
A New Clustering Routing Protocol for Homogeneous Wireless Sensor Networks Powered by Renewable Energy Sources. 637-648

Anas Mokhtari, Mostafa Azizi, Mohammed Gabli:
Scientific Applications in the Cloud: Resource Optimisation based on Metaheuristics. 649-660

Vipul Chudasama
, Madhuri D. Bhavsar:
A Dynamic Prediction for Elastic Resource Allocation in Hybrid Cloud Environment. 661-672

Auqib Hamid Lone, Roohie Naaz Mir:
Forgery Protection of Academic Certificates through Integrity Preservation at Scale using Ethereum Smart Contract. 673-688

Tomasz Gajger
:
NVIDIA GPU Performance Monitoring using an Extension for Dynatrace OneAgent. 689-699

Florin Rosu:
Parallel Algorithm for Numerical Methods Applied to Fractional-order System. 701-707

Adrian F. Spataru
:
Decentralized and Fault Tolerant Cloud Service Orchestration. 709-725

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







