Forthcoming and Online First Articles

International Journal of High Performance Systems Architecture

International Journal of High Performance Systems Architecture (IJHPSA)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of High Performance Systems Architecture (12 papers in press)

Regular Issues

  • Design of Optimum Fault Tolerant Decoder using Five Input Majority Voter Based on Quantum Dot Cellular Automata   Order a copy of this article
    by Shiraz Husain, Namit Gupta 
    Abstract: The semiconductor industry is continuously seeking alternatives to CMOS technology for further shrinking and portability in devices. Quantum-dot Cellular Automata (QCA) is a good nominee and vibrant research topic in nano-regime from last two decades. Since fabrication of QCA is vulnerable to defects, fault tolerant component and circuit design strategies are necessary to circumvent the effects. Most of the circuits based on QCA design uses 3 and 5 input majority gates as its basic design component. Thus, the reliability of circuits depends on the accurate working of the majority gates. The purpose of this paper is to propose a new five-input majority voter that has high fault tolerance against several structural defects. An analytical approach is also used for representation of single cell omission defect. Besides this, a new fault tolerant 2 x 4 decoder with enable input is also proposed. The comparative analysis of five input majority voter and decoder is done with previous designs in literature. The result shows that the proposed designs have good fault tolerance and works equally good in other performance parameters as well.
    Keywords: Decoder; Fabrication Defects; Fault Tolerance; Majority Voter; QCADesigner; QCA.

Special Issue on: Advances in Multi-Core and Many-Core Systems

  • Knowledge-based mining with the game-theoretic rough set approach to handling inconsistent healthcare data   Order a copy of this article
    by Abhay Kumar Singh, Muhammad Rukunuddin Ghalib 
    Abstract: Healthcare data analysis played a crucial role in the medical industries for examining the medical data. Primarily, in smart healthcare applications, a massive volume of data must be handled and processed to make clinical decisions. This clinical analysis process requires more time and complexity due to the high-dimensionality data. Therefore, machine learning and intelligent techniques are introduced in the healthcare data analysis field to improve data processing. This paper focuses on developing knowledge-based mining with a game-theoretic rough set (KM-GTRS) based healthcare data analysis process. The knowledge mining process able to handling the high-dimensional data and providing the data to the application-centric services. Here the introduced game-theoretic rough set algorithm analyzing the medical data and capable of handling the decision regarding the inconsistent and missing data effectively. In addition to this, the method ensures the solutions for medical data analysis with minimum time. The sufficient identification of inconsistent data improves the overall medical analysis recognition accuracy. This process achieves the minimum analysis time, computation complexity, inconsistency, and service latency.
    Keywords: Big Data; Healthcare; Knowledge Base; Linear Programming; Machine Learning.

  • Evaluation of Flexural and Shear Property of High Performance PLA/Bz Composite Filament Printed at Different FDM Parametric Conditions   Order a copy of this article
    by Sneha P, Balamurugan K, Kalusuraman G 
    Abstract: The reinforcement of metal in the Polylactic acid (PLA) matrix provides significant changes in improving the material properties, particularly for 3D-printing. In the present work, 14% of Bronze (Bz) that has the particle size of 10-20
    Keywords: PLA-Bz; Fused deposition model; Density; Bend; Shear; Optical microscopy.

  • Pervasive Hybrid Two-Stage Fusion Model of Intelligent Wireless Network Security Threat Perception   Order a copy of this article
    by Feilu Hang, Linjiang Xie, Wei Guo, Yao Lv, Wei Ou, A. Shanthini 
    Abstract: The rapid development of software, hardware, and communications technologies has helped spread sensors, actuators, and heterogeneous devices connected through the internet, collecting and distributing a large amount of information, opening a unique class of advanced services available at any time. This paper introduced a Pervasive Hybrid two-stage fusion model (PHTSFM) for the cybersecurity situation evaluation and focused on multi-heterogeneous sensors to determine the impact of security threats on a networked system and precisely evaluate system safety. The multisource information\'s characteristics in network security analysis and data fusion security algorithms have been introduced. Multiple correlations are utilized to differentiate the normal event or outlier and abnormal event within the least delay. The simulated network assessment reveals that the proposed solution is appropriate for the network environment, and the findings of the test are precise and effective.
    Keywords: Fusion Model; Intelligent Network Security; Threat Detection; Hybrid Two-stage Model Fusion Model.

  • Multimodal Information Interaction and Fusion for The Parallel Computing System Using AI Techniques   Order a copy of this article
    by Yang Li, Wei Li, Na Li, Xiaoli Qiu, Parthasarathy Poovendran, KARTHIK BALA MANOKARAN 
    Abstract: Recently multimodal information fusion systems are popularly used to increase the reliability of recognition systems. These systems employ data from different modalities. Since different modalities capture information with different attributes, the fusion of this information aids in achieving better solutions. In this research, we present a Multimodal Fusion for Parallel Computing scheme. Here, a novel Multi-modal Fusion-based Parallel Computing (MMFPC) Model is being proposed. Besides, a new technique for the generation of history images is also proposed. Feature extraction using GLCM and HOG features is performed. The fusion of multimodal features using the weighted fusion technique is proposed to prioritize the modes that contain more valuable data. Classification is analyzed using different artificial intelligence algorithms. Finally, the proposed scheme is evaluated using a public fall detection dataset. It was observed that the proposed system achieves a high accuracy of 96.77% and also a high specificity of 93.52%.
    Keywords: Multi-modal; parallel computing; artificial intelligence; fall.

  • Optimized embedded sensor network using multicore architecture for low power application   Order a copy of this article
    by Peng Li, Bo Mei, Yiran Wang 
    Abstract: Embedded infrastructure takes on a significant role in energy and efficiency since the Rise of the Internet of Things (IoT). Besides, energy management accomplishments linger on the darker side of science with the condition of elevated multicore embedded systems. Numerous algorithms were offered in embedded frameworks for productive use of switching frequency, including dynamically scaled rates, thread representation and scarcity methods. This system was used as energy efficiency modes for controlling power usage in the embedded interfaces. These approaches have, however, some bottlenecks that enable use in the embedded frameworks. In light of these, this study proposes a novel MCA-LPA technique that includes a robust learning device optimization for switching frequency by entry and core allotment based on the working load.rnThe suggested multicore architecture for low power application MCA-LPA model architecture consists of various steps in developing, classification and automating workloads using BAT equations and intense, profound learning predictions.
    Keywords: multicore architecture; power consumption; embedded sensor network; Optimization.

  • Reconfigurable architecture for Heterogeneous multi-Core and many-Core architecture with IoT assistance   Order a copy of this article
    by Xuefeng Xing, Jing Cao, Hongtao Zhou, Lei Song, Yanan Qiu 
    Abstract: This article discusses a multi-Core real-time device that is reconfigurable and has a sequence of configurations, each lifted to a predetermined state, executing different functions performed by the process. A complex system program is generated when implemented as processes. This situation is due to the increasing amount of threads and the consistency that can contribute to a growing energy usage between the individual installations. In this article, the Reconfigurable architecture for Heterogeneous multi-Core architecture (RA-HMCA) framework is proposed. However, researchers intend to simplify the program by preventing redundancies from being introduced and decrease the risk of threads when satisfying all necessary real-time requirements. The suggested solution employs multi-integer linear programming (MILP) technology in the scan stage to have a viable task model. An optically reconfigurable POSIX-based program creates a procedural performance of this technology. A research paper implementation and successful assessment support and validates the findings predicted.
    Keywords: multi-Core architecture; Reconfigurable architecture; Heterogeneous system; many-Core architecture; Internet of Things.

  • Network Security Defense System based on Artificial Intelligence and Big Data Technology   Order a copy of this article
    by Linjiang Xie, Feilu Hang, Wei Guo, Yao Lv, Wei Ou, FHA. Shibly 
    Abstract: Communication Network security is a defense against hacking, violence, and unwanted system modifications to access files and folders within a computer network. The increasing overlap between the physical and virtual realms of improved communication poses a problem of cybersecurity. To predict, identify, define, and resolve security risks, cybersecurity researchers depend on large quantities of security incidents. Hence, in this research, the Big Data Analytics based security system (BDASS) has been proposed to improve the communication network\'s security defense system with artificial intelligence. The big data sets representing multiple categories of data are used in big data analysis methods. Artificial intelligence offers algorithms that can think or learn and strengthen their behavior. A variety of automated systems currently are built on syntactic rules that are not necessarily sufficiently sophisticated to handle the degree of difficulty in the communication network system. The BDASS model achieves a less computation time ratio of 21.3%, misbehavior detection ratio of 97.5%, attack prediction accuracy ratio of 95.6%, possibility ratio of 96.4%, and success rate of 98.7% compared to other methods.
    Keywords: Artificial intelligence; Big Data Analytics; Communication Network security.

Special Issue on: EDIS2020 New Trends in Embedded and Distributed Systems Architecture and Applications

  • QASIS: A QoC aware Stress Identification System using Machine Learning Approach   Order a copy of this article
    by Souad Elhannani, Sidi Mohamed BENSLIMANE, KHALFI Mohammed Fethi, Mustafa Fechfouch 
    Abstract: Stress is a serious health problem that affects a large part of humanity. Early stress detection can help to prevent stress-related health problems. The Internet of Things (IoT) plays an important role in real time monitoring in the smart healthcare system. In this paper, we present an automatic stress detection system, called QASIS, to increases the effectiveness and efficiency of healthcare system to provide services. QASIS benefits of emerging wearable physiological sensors, specifically, electromyograph (EMG), electrocardiogram (ECG), and nasal/oral airflow, to monitors physical, cognitive and emotional stress. Our system uses an Extra Trees Classifier to achieve expected results in the areas such as car driving. We also illustrate how the reliability of the contextual information represented by QoC metrics, can enhance the accuracy of the stress detection system. We conducted a stress detection experiment with twenty-six subjects, and we confirmed that the proposed system could effectively detect stress, based on the measured breathing rate and the electrical activity of the heart and the muscles.
    Keywords: Internet of Things ; Quality of context (QoC); Healthcare system; Situation Identification; Stress detection; Machine learning; Extra Trees Classifier.

  • Optimization of Multi-objective Problems using An efficient Levy Flight Grasshopper Algorithm   Order a copy of this article
    by Dallel NASRI, Diab MOKEDDEM 
    Abstract: This paper is concerned in improving the performance of the nature-inspired multi-objective grasshopper optimization algorithm (MOGOA). The Levy flight technique is used for the first time to boost MOGOA algorithm by providing better solutions diversity. The proposed Levy flight trajectory-based multi-objective grasshopper optimization algorithm (LMOGOA) benefits from fast convergence speed to the true Pareto-optimal front and thus it overcomes MOGOA drawbacks of premature convergence and local optima stagnation. Then, LMOGOA algorithm is tested on a set of standard multi-objective problems(MOPs) and results proved significantly its outperformance compared to MOGOA algorithm.
    Keywords: multi-objective; grasshopper optimization algorithm; Levy flight trajectory; Constrained optimization.

  • A novel cooperative clustering approach based on multi-criteria decision-making for IoV   Order a copy of this article
    by Mahmoud Bersali, Abderrezak Rachedi, Hafida Bouarfa, Mohamed El Amine Badjara 
    Abstract: The introduction of the Internet of Things has gradually transformed conventional vehicular ad-hoc networks (VANETs) into a new paradigm known as the Internet of Vehicles (IoV), which has lately been the focus of several researchers. Frequent topological changes and the scalability issue are major problems that affect the performance of IoV. In order to overcome the previous challenges, we propose in this paper a novel cooperative clustering approach based on multi-criteria decision-making (MCDM) methods for IoV named: CMC-IoV, which combines both AHP and PROMETHEE methods to select the most appropriate leader for each cluster. CMC-IoV supports the cluster stability by selecting a Vice Cluster Leader as a complement to the Cluster Leader. We validate the efficiency of the proposed approach by using a realistic scenario from Highway 640 in Knoxville, USA as an input to the NS-3 network simulator.
    Keywords: VANET; Internet of Vehicles (IoV); MCDM; AHP; PROMETHEE; Clustering.

  • Memory-Processor co-scheduling for Real-time Tasks on Network-on-chip manycore architectures   Order a copy of this article
    by Chawki Benchehida, Mohammed Kamel Benhaoua, Houssam Eddine Zahaf, Giuseppe Lipari 
    Abstract: The Network-on-Chip (NoC) provides a viable solution to bus-contention problems in classical Multi/Many core architectures. However, NoC complex design requires a particular attention to support the execution of real-time workloads. It is necessary to take into account task-to-core allocation and inter-task communication, so that all timing constraints are respected. The problem is more complex when considering task-to-main-memory communication, as the main memory is off-chip and usually connected to the network edges, within the 2D-Mesh topology.rnrnIn this paper, we tackle these problems by considering the allocation of tasks and inter-task-communications, and memory-to-task communications (modeled using Directed Acyclic Graphs DAGs) at the same time, rather than separating them, as it has been addressed in the literature of real-time systems. This problem is highly combinatorial, therefore our approach transforms it at each step, to a simpler problem until reaching the classical single-core schedulability problem. The goal is to find a trade-off between the problem combinatorial explosion and the loss of generality when simplifying the problem. We study the effectiveness of the proposed approaches using a large set of synthetic experiments.
    Keywords: Real-time Systems; Network-on-Chip; SDRAM; Partitioned Scheduling; Task Allocation.