The Journal of Supercomputing

https://link.springer.com/journal/11227

List of Papers (Total 538)

A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain

With the rapid advancements of the mineral industry, the data generated by this industry chain have increased dramatically. To reduce the growing pressure of data storage and security risks, we design a credible on-chain and off-chain collaborative dual storage system that integrates blockchain technology and Interplanetary file system (IPFS), also construct a traceable and...

SIMD vectorization for simultaneous solution of locally varying linear systems with multiple right-hand sides

Developments in numerical simulation of flows and high-performance computing influence one another. More detailed simulation methods create a permanent need for more computational power, while new hardware developments often require changes to the software to exploit new hardware features. This dependency is very pronounced in the case of vector-units which are featured by all...

The music demixing machine: toward real-time remixing of classical music

Classical music, unlike popular music, is usually recorded live with close microphone techniques. For this reason, isolated tracks are not available to create the final mixture/stream, and so the mixing process requires greater effort. Source separation methods are a potential solution to this problem. However, current algorithms are not fast enough to yield real-time separation...

Thresholding methods in non-intrusive load monitoring

Non-intrusive load monitoring (NILM) is the problem of predicting the status or consumption of individual domestic appliances only from the knowledge of the aggregated power load. NILM is often formulated as a classification (ON/OFF) problem for each device. However, the training datasets gathered by smart meters do not contain these labels, but only the electric consumption at...

Vertex transitivity and distance metric of the quad-cube

The quad-cube is a special case of the metacube that itself is derivable from the hypercube. It is amenable to an application as a network topology, especially when the node size exceeds several million. This paper presents the following welcome properties of the graph, relating to its structure: (1) vertex transitivity that facilitates the working of an algorithm meant for a...

Estimating the energy consumption of model-view-controller applications

For information and communication technology to reach its goal of zero emissions in 2050, power consumption must be reduced, including the energy consumed by software. To develop sustainability-aware software, green metrics have been implemented to estimate the energy consumed by the execution of an application. However, they have a rebound energy consumption effect because they...

Response of HPC hardware to neutron radiation at the dawn of exascale

Every computation presents a small chance that an unexpected phenomenon ruins or modifies its output. Computers are prone to errors that, although may be very unlikely, are hard, expensive or simply impossible to avoid. In the exascale, with thousands of processors involved in a single computation, those errors are especially harmful because they can corrupt or distort the...

Flexible multi-client functional encryption for set intersection

A multi-client functional encryption ( $$\textsf{MCFE}$$ ) scheme [Goldwasser–Gordon–Goyal 2014] for set intersection is a cryptographic primitive that enables an evaluator to learn the intersection from all sets of a predetermined number of clients, without need to learn the plaintext set of each individual client. Using these schemes, it is impossible to compute the set...

An evaluation of relational and NoSQL distributed databases on a low-power cluster

The constant growth of social media, unconventional web technologies, mobile applications, and Internet of Things (IoT) devices create challenges for cloud data systems in order to support huge datasets and very high request rates. NoSQL databases, such as Cassandra and HBase, and relational SQL databases with replication, such as Citus/PostgreSQL, have been used to increase...

Efficient GPU implementation of a Boltzmann-Schrödinger-Poisson solver for the simulation of nanoscale DG MOSFETs

A previous study by Mantas and Vecil (Int J High Perform Comput Appl 34(1): 81–102, 2019) describes an efficient and accurate solver for nanoscale DG MOSFETs through a deterministic Boltzmann-Schrödinger-Poisson model with seven electron–phonon scattering mechanisms on a hybrid parallel CPU/GPU platform. The transport computational phase, i.e. the time integration of the...

AEGA: enhanced feature selection based on ANOVA and extended genetic algorithm for online customer review analysis

Sentiment analysis involves extricating and interpreting people’s views, feelings, beliefs, etc., about diverse actualities such as services, goods, and topics. People intend to investigate the users’ opinions on the online platform to achieve better performance. Regardless, the high-dimensional feature set in an online review study affects the interpretation of classification...

EIDM: deep learning model for IoT intrusion detection systems

Internet of Things (IoT) is a disruptive technology for the future decades. Due to its pervasive growth, it is susceptible to cyber-attacks, and hence the significance of Intrusion Detection Systems (IDSs) for IoT is pertinent. The viability of machine learning has encouraged analysts to apply learning techniques to intelligently discover and recognize cyber attacks and unusual...

Textual emotion detection utilizing a transfer learning approach

Many attempts have been made to overcome the challenges of automating textual emotion detection using different traditional deep learning models such as LSTM, GRU, and BiLSTM. But the problem with these models is that they need large datasets, massive computing resources, and a lot of time to train. Also, they are prone to forgetting and cannot perform well when applied to small...

Model-based and model-free deep features fusion for high performed human gait recognition

In the last decade, the need for a non-contact biometric model for recognizing candidates has increased, especially after the pandemic of COVID-19 appeared and spread worldwide. This paper presents a novel deep convolutional neural network (CNN) model that guarantees quick, safe, and precise human authentication via their poses and walking style. The concatenated fusion between...

Efficient design of a quantum absolute-value circuit using Clifford+T gates

Current quantum computers have a limited number of resources and are heavily affected by internal and external noise. Therefore, small, noise-tolerant circuits are of great interest. With regard to circuit size, it is especially important to reduce the number of required qubits. Concerning to fault-tolerance, circuits entirely built with Clifford+T gates allow the use of error...

Fault-tolerant quantum algorithm for dual-threshold image segmentation

The intrinsic high parallelism and entanglement characteristics of quantum computing have made quantum image processing techniques a focus of great interest. One of the most widely used techniques in image processing is segmentation, which in one of their most basic forms can be carried out using thresholding algorithms. In this paper, a fault-tolerant quantum dual-threshold...

Machine learning-based models for the qualitative classification of potassium ferrocyanide using electrochemical methods

Iron is one of the trace elements that plays a vital role in the human immune system, especially against variants of SARS-CoV-2 virus. Electrochemical methods are convenient for the detection due to the simplicity of instrumentation available for different analyses. The square wave voltammetry (SQWV) and differential pulse voltammetry (DPV) are useful electrochemical voltammetric...

FPGA implementation of hardware accelerated RTOS based on real-time event handling

Actual trends in the real-time system field consists of migration towards complex central processing unit (CPU) architectures with enhanced execution predictability and rapid CPU contexts switch, thus obtaining high-performant control systems. The main objective of this paper is to present the results obtained following the implementation of real-time operating systems (RTOS...

WSMP: a warp scheduling strategy based on MFQ and PPF

Normally, threads in a warp do not severely interfere with each other. However, the scheduler must wait until all the threads within complete before scheduling the next warp, resulting in memory divergence. The crux of the problem is scheduling the warp in a more reasonable order. Therefore, we propose a new warp scheduling strategy called WSMP, which is based on multi-level...

Parallelisation of decision-making techniques in aquaculture enterprises

Nowadays, the Artificial Intelligent (AI) techniques are applied in enterprise software to solve Big Data and Business Intelligence (BI) problems. But most AI techniques are computationally excessive, and they become unfeasible for common business use. Therefore, specific high performance computing is needed to reduce the response time and make these software applications viable...

MECInOT: a multi-access edge computing and industrial internet of things emulator for the modelling and study of cybersecurity threats

In recent years, the Industrial Internet of Things (IIoT) has grown rapidly, a fact that has led to an increase in the number of cyberattacks that target this environment and the technologies that it brings together. Unfortunately, when it comes to using tools for stopping such attacks, it can be noticed that there are inherent weaknesses in this paradigm, such as limitations in...

A comparative analysis of meta-heuristic optimization algorithms for feature selection on ML-based classification of heart-related diseases

This study aims to use a machine learning (ML)-based enhanced diagnosis and survival model to predict heart disease and survival in heart failure by combining the cuckoo search (CS), flower pollination algorithm (FPA), whale optimization algorithm (WOA), and Harris hawks optimization (HHO) algorithms, which are meta-heuristic feature selection algorithms. To achieve this...