Skip to main content

Computing OnlineFirst articles

23-04-2024 | Regular Paper

Semantically realizing discovery and composition for RESTful web services

The processes of service discovery and composition are crucial tasks in application development driven by Web Services. However, with RESTful Web Service replacing SOAP-based Web Service as the dominant service-providing approach, the research on …

Authors:
Haijun Gu, Yingyu Ma, Siqi Wang, Xincheng Chen, Weihua Su

22-04-2024 | Regular Paper

Generalizing truth discovery by incorporating multi-truth features

Truth discovery is the fundamental technique for resolving the conflicts between the information provided by different data sources by detecting the true values. Traditional methods assume that each data item has only one true value and therefore …

Authors:
Xiu Susie Fang, Xianzhi Wang, Quan Z. Sheng, Lina Yao

18-04-2024 | Regular Paper

Four vector intelligent metaheuristic for data optimization

Swarm intelligence (SI) algorithms represent a class of Artificial Intelligence (AI) optimization metaheuristics used for solving complex optimization problems. However, a key challenge in solving complex problems is maintaining the balance …

Authors:
Hussam N. Fakhouri, Feras M. Awaysheh, Sadi Alawadi, Mohannad Alkhalaileh, Faten Hamad

17-04-2024 | Regular Paper

Improved optimal foraging algorithm for global optimization

The optimal foraging algorithm (OFA) is a swarm-based algorithm motivated by animal behavioral ecology theory. When solving complex optimization problems characterized by multiple peaks, OFA is easy to get trapped in local minima and encounters …

Authors:
Chen Ding, GuangYu Zhu

15-04-2024 | Regular Paper

A two-phase method to optimize service composition in cloud manufacturing

Service composition is widely employed in cloud manufacturing. Due to the abundance of similar cloud manufacturing services, the search space for optimizing service composition tends to be expansive. Existing optimization models primarily focus on …

Authors:
Qiang Hu, Haoquan Qi, Yanzhe Jia, Lianen Qu

14-04-2024 | Regular Paper

Identifying vital spreaders in complex networks based on the interpretative structure model and improved Kshell

The identification of vital spreaders in complex networks has been one of the most interesting topics in network science. Several methods were proposed to deal with this challenge, but there still exist deficiencies in previous methods, such as …

Authors:
Tianchi Tong, Qian Dong, Wenying Yuan, Jinsheng Sun

12-04-2024 | Regular Paper

Online RSSI selection strategy for indoor positioning in low-effort training scenarios

Indoor positioning has been extensively studied for at least the past twenty years. In the list of the most common solutions, those based on the Received Strength Signal Indicator (RSSI) have gained importance due to the simplicity of RSSI as well …

Authors:
Braulio Pinto, Horacio Oliveira

09-04-2024 | Regular Paper

Qos-based web service selection using time-aware collaborative filtering: a literature review

The proliferation of available Web services presents a big challenge in selecting suitable services. Various methods have been devised to predict Quality of Service (QoS) values, aiming to address the service selection problem. However, these …

Authors:
Ezdehar Jawabreh, Adel Taweel

07-04-2024 | Regular Paper

Optimization for energy-aware design of task scheduling in heterogeneous distributed systems: a meta-heuristic based approach

The motivation of task scheduling in heterogeneous computing systems is the optimal management of heterogeneous distributed resources as well as the exploitation of system capabilities. Energy consumption is one of the most important issues in …

Authors:
Cen Li, Liping Chen

04-04-2024 | Regular Paper

Community anomaly detection in attribute networks based on refining context

With the widespread use of attribute networks, anomalous node detection on attribute networks has received increasing attention. By utilizing communities as reference contexts for local anomaly node detection, it is possible to uncover a multitude …

Authors:
Yonghui Lin, Li Xu, Wei Lin, Jiayin Li

03-04-2024 | Regular Paper

A hybrid energy-aware algorithm for virtual machine placement in cloud computing

Virtual Machine Placement (VMP) plays a significant role in improving efficiency of Cloud Data Center (CDC). With the dramatic increase in the use of cloud computing, it seems necessary to apply effective algorithms to reduce the power consumption …

Authors:
Malek Yousefi, Seyed Morteza Babamir

Open Access 03-04-2024 | Special Issue Article

Cloud storage tier optimization through storage object classification

Cloud storage adoption has increased over the years given the high demand for fast processing, low access latency, and ever-increasing amount of data being generated by, e.g., Internet of Things applications. In order to meet the users’ demands …

Authors:
Akif Quddus Khan, Mihhail Matskin, Radu Prodan, Christoph Bussler, Dumitru Roman, Ahmet Soylu

02-04-2024 | Regular Paper

Unraveling human social behavior motivations via inverse reinforcement learning-based link prediction

Link prediction aims to capture the evolution of network structure, especially in real social networks, which is conducive to friend recommendations, human contact trajectory simulation, and more. However, the challenge of the stochastic social …

Authors:
Xin Jiang, Hongbo Liu, Liping Yang, Bo Zhang, Tomas E. Ward, Václav Snášel

25-03-2024 | Regular Paper

Person re-identification method based on fine-grained feature fusion and self-attention mechanism

Aiming at the problem of low accuracy of person re-identification (Re-ID) algorithm caused by occlusion, low distinctiveness of person features and unclear detail features in complex environment, we propose a Re-ID method based on fine-grained …

Authors:
Kangning Yin, Zhen Ding, Zhihua Dong, Xinhui Ji, Zhipei Wang, Dongsheng Chen, Ye Li, Guangqiang Yin, Zhiguo Wang

23-03-2024 | Regular Paper

Matyas–Meyer Oseas based device profiling for anomaly detection via deep reinforcement learning (MMODPAD-DRL) in zero trust security network

The exposure of zero trust security in the Industrial Internet of Things (IIoT) increased in importance in the era where there is a huge risk of injection of malicious entities and owning the device by an unauthorized user. The gap in the existing …

Authors:
Rajesh Kumar Dhanaraj, Anamika Singh, Anand Nayyar

23-03-2024 | Regular Paper

Categorical learning for automated network traffic categorization for future generation networks in SDN

Network traffic classification is a fundamental and intricate component of network management in the modern, high-tech era of 5G architectural design, planning of resources, and other areas. Investigation of traffic classification is a key …

Authors:
Suguna Paramasivam, R. Leela Velusamy, J. V. Nishaanth

21-03-2024 | Regular Paper

Influence maximization in mobile social networks based on RWP-CELF

Influence maximization (IM) problem for messages propagation is an important topic in mobile social networks. The success of the spreading process depends on the mechanism for selection of the influential user. Beside selection of influential …

Authors:
Zhenyu Xu, Xinxin Zhang, Mingzhi Chen, Li Xu

Open Access 19-03-2024 | Regular Paper

Enhancing information freshness in multi-class mobile edge computing systems using a hybrid discipline

Timely status updating in mobile edge computing (MEC) systems has recently gained the utmost interest in internet of things (IoT) networks, where status updates may need higher computations to be interpreted. Moreover, in real-life situations, the …

Authors:
Tamer E. Fahim, Sherif I. Rabia, Ahmed H. Abd El-Malek, Waheed K. Zahra

15-03-2024 | Regular Paper

An improved indicator-based two-archive algorithm for many-objective optimization problems

The large number of objectives in many-objective optimization problems (MaOPs) has posed significant challenges to the performance of multi-objective evolutionary algorithms (MOEAs) in terms of convergence and diversity. To design a more balanced …

Authors:
Weida Song, Shanxin Zhang, Wenlong Ge, Wei Wang

Open Access 15-03-2024 | Regular Paper

Reducing the wrapping effect of set computation via Delaunay triangulation for guaranteed state estimation of nonlinear discrete-time systems

Set computation methods have been widely used to compute reachable sets, design invariant sets and estimate system state for dynamic systems. The wrapping effect of such set computation methods plays an essential role in the accuracy of their …

Authors:
Jian Wan, Luc Jaulin