{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:38:54Z","timestamp":1740123534360,"version":"3.37.3"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T00:00:00Z","timestamp":1631577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T00:00:00Z","timestamp":1631577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s11227-021-04045-3","type":"journal-article","created":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T10:02:51Z","timestamp":1631613771000},"page":"4960-4976","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A neural network-based approach for the performance evaluation of branch prediction in instruction-level parallelism processors"],"prefix":"10.1007","volume":"78","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6741-5524","authenticated-orcid":false,"given":"Sweety","family":"Nain","sequence":"first","affiliation":[]},{"given":"Prachi","family":"Chaudhary","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,14]]},"reference":[{"issue":"15","key":"4045_CR1","first-page":"2843","volume":"119","author":"Sweety","year":"2018","unstructured":"Sweety, Chaudhary P (2018) Branch prediction techniques used in pipeline processors: a review. Int J Pure Appl Math 119(15):2843\u20132851","journal-title":"Int J Pure Appl Math"},{"key":"4045_CR2","unstructured":"Sweety, Chaudhary P (2020) Towards the improving branch instructions identification in high-performance processors issues, challenges and techniques. In: Recent Advances in Computer Science and Communications [Online]. Available: https:\/\/www.eurekaselect.com\/node\/191298\/article\/towards-the-improving-branch-instructions-identification-in-high-performance-processors-issues-challenges-and-techniques"},{"issue":"09","key":"4045_CR3","doi-asserted-by":"publisher","first-page":"1156","DOI":"10.31838\/jcr.07.09.212","volume":"7","author":"Sweety","year":"2020","unstructured":"Sweety, Chaudhary P (2020) Design and Fpga based implementation of 1-bit dynamic branch predictor for the parallelism processor. J Crit Rev 7(09):1156\u20131162. https:\/\/doi.org\/10.31838\/jcr.07.09.212","journal-title":"J Crit Rev"},{"key":"4045_CR4","doi-asserted-by":"publisher","unstructured":"Sweety, Chaudhary P (2019) Implemented static branch prediction schemes for the parallelism processors. In: International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (IEEE Xplore), pp 79\u201383. https:\/\/doi.org\/10.1109\/COMITCon.2019.8862216","DOI":"10.1109\/COMITCon.2019.8862216"},{"issue":"3","key":"4045_CR5","doi-asserted-by":"publisher","first-page":"1145","DOI":"10.1007\/s41870-021-00631-z","volume":"13","author":"S Nain","year":"2021","unstructured":"Nain S, Chaudhary P (2021) Implementation and comparison of bi-modal dynamic branch prediction with static branch prediction schemes. Int J Inf Technol (Singap) 13(3):1145\u20131153. https:\/\/doi.org\/10.1007\/s41870-021-00631-z","journal-title":"Int J Inf Technol (Singap)"},{"key":"4045_CR6","unstructured":"Sweety, Chaudhary P (2020) A hybrid branch prediction approach for high-performance processors. In: Recent Advances in Computer Science and Communications [Online]. Available: http:\/\/www.eurekaselect.com\/98027\/article"},{"issue":"4","key":"4045_CR7","doi-asserted-by":"publisher","first-page":"448","DOI":"10.3390\/electronics10040448","volume":"10","author":"MA Islas","year":"2021","unstructured":"Islas MA et al (2021) A fuzzy logic model for hourly electrical power demand modeling. Electronics 10(4):448. https:\/\/doi.org\/10.3390\/electronics10040448","journal-title":"Electronics"},{"key":"4045_CR8","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1016\/j.ins.2021.05.018","volume":"569","author":"JJ de Rubio","year":"2021","unstructured":"de Rubio JJ et al (2021) Adapting H-infinity controller for the desired reference tracking of the sphere position in the Maglev process. Inf Sci 569:669\u2013686. https:\/\/doi.org\/10.1016\/j.ins.2021.05.018","journal-title":"Inf Sci"},{"key":"4045_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2020.3015200","author":"JJ de Rubio","year":"2020","unstructured":"de Rubio JJ (2020) Stability analysis of the modified Levenberg\u2013Marquardt algorithm for the artificial neural network training. IEEE Trans Neural Netw Learn Syst. https:\/\/doi.org\/10.1109\/TNNLS.2020.3015200","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"issue":"1","key":"4045_CR10","doi-asserted-by":"publisher","first-page":"33","DOI":"10.12785\/ijcds\/080104","volume":"8","author":"S Abudalfa","year":"2019","unstructured":"Abudalfa S, Almohamd M, Ahmed M (2019) Comparative study on behavior-based dynamic branch prediction using machine learning. Int J Comput Digit Syst 8(1):33\u201341. https:\/\/doi.org\/10.12785\/ijcds\/080104","journal-title":"Int J Comput Digit Syst"},{"key":"4045_CR11","doi-asserted-by":"publisher","first-page":"103255","DOI":"10.1109\/ACCESS.2019.2929266","volume":"7","author":"H-S Chiang","year":"2019","unstructured":"Chiang H-S, Chen M-Y, Huang Y-J (2019) Wavelet-based EEG processing for epilepsy detection using fuzzy entropy and associative petri net. IEEE Access 7:103255\u2013103262. https:\/\/doi.org\/10.1109\/ACCESS.2019.2929266","journal-title":"IEEE Access"},{"key":"4045_CR12","doi-asserted-by":"publisher","first-page":"31968","DOI":"10.1109\/ACCESS.2018.2846483","volume":"6","author":"JA Meda-Campa\u00f1a","year":"2018","unstructured":"Meda-Campa\u00f1a JA (2018) On the estimation and control of nonlinear systems with parametric uncertainties and noisy outputs. IEEE Access 6:31968\u201331973. https:\/\/doi.org\/10.1109\/ACCESS.2018.2846483","journal-title":"IEEE Access"},{"key":"4045_CR13","doi-asserted-by":"publisher","first-page":"85","DOI":"10.3389\/fnbot.2020.590371","volume":"14","author":"F Furl\u00e1n","year":"2020","unstructured":"Furl\u00e1n F, Rubio E, Sossa H, Ponce V (2020) CNN based detectors on planetary environments: a performance evaluation. Front Neurorobot 14:85. https:\/\/doi.org\/10.3389\/fnbot.2020.590371","journal-title":"Front Neurorobot"},{"key":"4045_CR14","volume-title":"Branch Prediction Techniques and Optimizations","author":"R Parihar","year":"2015","unstructured":"Parihar R (2015) Branch Prediction Techniques and Optimizations. University of Rochester, New York"},{"issue":"1","key":"4045_CR15","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MC.1984.1658927","volume":"17","author":"JKF Lee","year":"1984","unstructured":"Lee JKF, Smith AJ (1984) Branch prediction strategies and branch target buffer design. Computer 17(1):6\u201322. https:\/\/doi.org\/10.1109\/MC.1984.1658927","journal-title":"Computer"},{"key":"4045_CR16","doi-asserted-by":"publisher","unstructured":"Bate I , Reutemann R (2005) Efficient integration of bimodal branch prediction and pipeline analysis. In: Proceedings\u201411th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, pp 39\u201344. https:\/\/doi.org\/10.1109\/RTCSA.2005.41","DOI":"10.1109\/RTCSA.2005.41"},{"key":"4045_CR17","unstructured":"Wu M, Cen Z, Zhou J (2002) Exploring dynamic branch prediction methods, Department of Computer Science and Engineering, Michigan State University, Fall"},{"key":"4045_CR18","doi-asserted-by":"publisher","unstructured":"Yeh T-Y, Patt YN (1992) Alternative implementations of two-level adaptive branch prediction. In: Proceedings of the 19th Annual International Symposium on Computer Architecture\u2014ISCA \u201992, vol 20, no 2, pp 124\u2013134. https:\/\/doi.org\/10.1145\/139669.139709","DOI":"10.1145\/139669.139709"},{"issue":"22","key":"4045_CR19","first-page":"233","volume":"116","author":"M Poongodi","year":"2017","unstructured":"Poongodi M, Al-Shaikhli IF, Vijayakumar V (2017) The probabilistic approach of energy utility and reusability model with enhanced security from the compromised nodes through wireless energy transfer in WSN. Int J Pure Appli Math 116(22):233\u2013250","journal-title":"Int J Pure Appli Math"},{"issue":"6","key":"4045_CR20","first-page":"574","volume":"9","author":"M Poongodi","year":"2015","unstructured":"Poongodi M, Bose S (2015) The COLLID based intrusion detection system for detection against DDOS attacks using trust evaluation. Adv Nat Appl Sci 9(6):574\u2013580","journal-title":"Adv Nat Appl Sci"},{"issue":"4","key":"4045_CR21","doi-asserted-by":"publisher","first-page":"1549","DOI":"10.1007\/s10586-015-0496-y","volume":"18","author":"M Poongodi","year":"2015","unstructured":"Poongodi M, Bose S (2015) Stochastic model: recaptcha controller based co-variance matrix analysis on frequency distribution using trust evaluation and re-eval by aumann agreement theorem against DDoS attack in MANET. Clust Comput 18(4):1549\u20131559. https:\/\/doi.org\/10.1007\/s10586-015-0496-y","journal-title":"Clust Comput"},{"issue":"4","key":"4045_CR22","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1504\/IJENM.2015.073869","volume":"6","author":"M Poongodi","year":"2015","unstructured":"Poongodi M, Bose S, Ganeshkumar N (2015) The effective intrusion detection system using optimal feature selection algorithm. Int J Enterp Netw Manag 6(4):263\u2013274. https:\/\/doi.org\/10.1504\/IJENM.2015.073869","journal-title":"Int J Enterp Netw Manag"},{"key":"4045_CR23","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.procs.2015.04.053","volume":"50","author":"M Poongodi","year":"2015","unstructured":"Poongodi M, Bose S (2015) Detection and prevention system towards the truth of convergence on decision using Aumann agreement theorem. Proc Comput Sci 50:244\u2013251. https:\/\/doi.org\/10.1016\/j.procs.2015.04.053","journal-title":"Proc Comput Sci"},{"key":"4045_CR24","doi-asserted-by":"crossref","unstructured":"Poongodi M, Bose S (2014) A firegroup mechanism to provide intrusion detection and prevention system against DDos attack in collaborative clustered networks. Int J Inf Secur Priv 1\u201318 [Online]. Available:https:\/\/www.igi-global.com\/article\/a-firegroup-mechanism-to-provide-intrusion-detection-and-prevention-system-against-ddos-attack-in-collaborative-clustered-networks\/130652","DOI":"10.4018\/IJISP.2014040101"},{"key":"4045_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-03778-5#citeas","author":"S Nain","year":"2021","unstructured":"Nain S, Chaudhary P (2021) An efficient branch predictor for improved accuracy of instruction level parallelism. J Supercomput. https:\/\/doi.org\/10.1007\/s11227-021-03778-5#citeas","journal-title":"J Supercomput"},{"key":"4045_CR26","doi-asserted-by":"publisher","DOI":"10.4108\/eai.4-3-2021.168865","author":"S Nain","year":"2021","unstructured":"Nain S, Chaudhary P (2021) An astute LVQ approach using neural network for the prediction of conditional branches in pipeline processor. ICST Trans Scalable Inf Syst. https:\/\/doi.org\/10.4108\/eai.4-3-2021.168865","journal-title":"ICST Trans Scalable Inf Syst"},{"key":"4045_CR27","doi-asserted-by":"publisher","unstructured":"Haque MSM, Hassan MR, Sulaiman M, Onoruoiza S, Kamruzzaman J, Arifuzzaman M (2019) Enhancing branch predictors using genetic algorithm. In: 8th International Conference on Modeling Simulation and Applied Optimization, ICMSAO 2019, pp 1\u20135. https:\/\/doi.org\/10.1109\/ICMSAO.2019.8880435","DOI":"10.1109\/ICMSAO.2019.8880435"},{"issue":"2","key":"4045_CR28","first-page":"200","volume":"20","author":"LN Vintan","year":"2019","unstructured":"Vintan LN (2019) Neural branch prediction: from the first ideas, to implementations in advanced microprocessors and medical applications. Proc Rom Acad Ser A Math Phys Tech Sci Inf Sci 20(2):200\u2013207","journal-title":"Proc Rom Acad Ser A Math Phys Tech Sci Inf Sci"},{"key":"4045_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/access.2020.3017196","volume":"8","author":"Y Mao","year":"2020","unstructured":"Mao Y, Zhou H, Gui X, Shen J (2020) Exploring convolution neural network for branch prediction. IEEE Access 8:1\u20131. https:\/\/doi.org\/10.1109\/access.2020.3017196","journal-title":"IEEE Access"},{"key":"4045_CR30","doi-asserted-by":"publisher","first-page":"86230","DOI":"10.1109\/ACCESS.2020.2992643","volume":"8","author":"L Zhang","year":"2020","unstructured":"Zhang L, Wu N, Ge F, Zhou F, Yahya MR (2020) A dynamic branch predictor based on parallel structure of SRNN. IEEE Access 8:86230\u201386237. https:\/\/doi.org\/10.1109\/ACCESS.2020.2992643","journal-title":"IEEE Access"},{"issue":"5","key":"4045_CR31","doi-asserted-by":"publisher","first-page":"27","DOI":"10.5815\/ijmecs.2017.05.04","volume":"9","author":"S Goyal","year":"2017","unstructured":"Goyal S, Singh J (2017) Two-level alloyed branch predictor based on genetic algorithm for deep pipelining processors. Int J Mod Educ Comput Sci 9(5):27\u201333. https:\/\/doi.org\/10.5815\/ijmecs.2017.05.04","journal-title":"Int J Mod Educ Comput Sci"},{"key":"4045_CR32","doi-asserted-by":"publisher","unstructured":"Mahmood HS, Omran SS (2019) Selective branch prediction schemes based on FPGA MIPS processor for educational purposes. In: IOP Conference Series: Materials Science and Engineering, pp 1\u201311 [Online]. Available: https:\/\/doi.org\/10.1088\/1757-899X\/518\/4\/042008","DOI":"10.1088\/1757-899X\/518\/4\/042008"},{"issue":"6","key":"4045_CR33","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1007\/s11704-013-2260-x","volume":"7","author":"W Jin","year":"2013","unstructured":"Jin W, Shi F, Song Q, Zhang Y (2013) A novel architecture for ahead branch prediction. Front Comput Sci 7(6):914\u2013923. https:\/\/doi.org\/10.1007\/s11704-013-2260-x","journal-title":"Front Comput Sci"},{"issue":"2","key":"4045_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2907071","volume":"49","author":"S Mittal","year":"2016","unstructured":"Mittal S (2016) A survey of recent prefetching techniques for processor caches. ACM Comput Surv 49(2):1\u201335. https:\/\/doi.org\/10.1145\/2907071","journal-title":"ACM Comput Surv"},{"key":"4045_CR35","doi-asserted-by":"publisher","first-page":"10779","DOI":"10.1109\/ACCESS.2017.2772334","volume":"6","author":"Y Mao","year":"2017","unstructured":"Mao Y, Shen J, Gui X (2017) A study on deep belief net for branch prediction. IEEE Access 6:10779\u201310786","journal-title":"IEEE Access"},{"key":"4045_CR36","doi-asserted-by":"publisher","unstructured":"Su X, Wu H, Yang Q (2016) An efficient wcet-aware hybrid global branch prediction approach. In: IEEE 22nd International Conference on Embedded and Real-Time Computing Systems and Applications, pp 195\u2013201. https:\/\/doi.org\/10.1109\/RTCSA.2016.46","DOI":"10.1109\/RTCSA.2016.46"},{"issue":"1","key":"4045_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.7815\/ijorcs.21.2011.008","volume":"2","author":"AK Tripathy","year":"2011","unstructured":"Tripathy AK, Mishra P (2011) A novel approach for branch prediction using SVM. Int J Adv Res Comput Sci 2(1):1\u201311","journal-title":"Int J Adv Res Comput Sci"},{"key":"4045_CR38","doi-asserted-by":"publisher","first-page":"2122","DOI":"10.1109\/ijcnn.2001.938494","volume":"3","author":"DA Jim\u00e9nez","year":"2001","unstructured":"Jim\u00e9nez DA, Lin C (2001) Perceptron learning for predicting the behavior of conditional branches. Proc Int Jt Conf Neural Netw 3:2122\u20132127. https:\/\/doi.org\/10.1109\/ijcnn.2001.938494","journal-title":"Proc Int Jt Conf Neural Netw"},{"issue":"2","key":"4045_CR39","first-page":"153","volume":"25","author":"VM Ribas","year":"2003","unstructured":"Ribas VM, Figueiredo MF, Go\u0146oalves RA (2003) Simulating a simple neural network on branch prediction. Acta Scientiarum Technol 25(2):153\u2013160","journal-title":"Acta Scientiarum Technol"},{"key":"4045_CR40","doi-asserted-by":"publisher","unstructured":"Ho CY, Fong ASS (2007) Combining local and global history hashing in perceptron branch prediction. In: 6th IEEE\/ACIS International Conference on Computer and Information Science (ICIS 2007), no Icis, pp 54\u201359. https:\/\/doi.org\/10.1109\/ICIS.2007.81","DOI":"10.1109\/ICIS.2007.81"},{"issue":"12\u201315","key":"4045_CR41","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1016\/S1383-7621(03)00095-X","volume":"49","author":"C Egan","year":"2003","unstructured":"Egan C, Steven G, Quick P, Anguera R, Steven F, Vintan L (2003) Two-level branch prediction using neural networks. J Syst Archit 49(12\u201315):557\u2013570. https:\/\/doi.org\/10.1016\/S1383-7621(03)00095-X","journal-title":"J Syst Archit"},{"key":"4045_CR42","unstructured":"\u201cui-reference @ www.jetbrains.com\u201d [Online]. Available: https:\/\/www.jetbrains.com\/help\/pycharm\/ui-reference.html"},{"issue":"2","key":"4045_CR43","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1145\/1273440.1250715","volume":"35","author":"H Kim","year":"2007","unstructured":"Kim H, Joao JA, Mutlu O, Lee CJ, Patt YN, Cohn R (2007) VPC prediction. ACM SIGARCH Comput Archit News 35(2):424\u2013435. https:\/\/doi.org\/10.1145\/1273440.1250715","journal-title":"ACM SIGARCH Comput Archit News"},{"key":"4045_CR44","doi-asserted-by":"crossref","unstructured":"Garza E, Mirbagher-Ajorpaz S, Khan TA, Jim\u00e9nez DA (2019) Bit-level perceptron prediction for indirect branches. In: 2019 ACM\/IEEE 46th Annual International Symposium on Computer Architecture (ISCA). IEEE, pp 27\u201338","DOI":"10.1145\/3307650.3322217"},{"issue":"8","key":"4045_CR45","first-page":"1135","volume":"3","author":"PZ Shah","year":"2014","unstructured":"Shah PZ, Prabhu SU (2014) Hybrid learning-based branch predictor. Int J Eng Res Technol 3(8):1135\u20131139","journal-title":"Int J Eng Res Technol"},{"key":"4045_CR46","doi-asserted-by":"publisher","unstructured":"Jim\u00e9nez DA (2003) Fast path-based neural branch prediction. In: Proceedings of the Annual International Symposium on Microarchitecture, MICRO, pp 243\u2013252. https:\/\/doi.org\/10.1109\/MICRO.2003.1253199","DOI":"10.1109\/MICRO.2003.1253199"},{"key":"4045_CR47","doi-asserted-by":"publisher","unstructured":"Jimenez DA, Lin C (2001) Dynamic branch prediction with perceptrons. In: Proceedings HPCA Seventh International Symposium on High-Performance Computer Architecture, pp 197\u2013206. https:\/\/doi.org\/10.1109\/HPCA.2001.903263","DOI":"10.1109\/HPCA.2001.903263"},{"issue":"3","key":"4045_CR48","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1145\/1089008.1089011","volume":"2","author":"D Tarjan","year":"2005","unstructured":"Tarjan D, Skadron K (2005) Merging path and gshare indexing in perceptron branch prediction. ACM Trans Archit Code Optim 2(3):280\u2013300. https:\/\/doi.org\/10.1145\/1089008.1089011","journal-title":"ACM Trans Archit Code Optim"},{"key":"4045_CR49","doi-asserted-by":"publisher","unstructured":"Vintan N, Iridon M (1999) Towards a high performance neural branch predictor. In: Proceedings of the International Joint Conference on Neural Networks, vol 2, pp 868\u2013873. https:\/\/doi.org\/10.1109\/ijcnn.1999.831066","DOI":"10.1109\/ijcnn.1999.831066"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04045-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04045-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04045-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,15]],"date-time":"2022-03-15T15:19:14Z","timestamp":1647357554000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04045-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,14]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["4045"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04045-3","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"type":"print","value":"0920-8542"},{"type":"electronic","value":"1573-0484"}],"subject":[],"published":{"date-parts":[[2021,9,14]]},"assertion":[{"value":"24 August 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 September 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}