default search action
Cluster Computing, Volume 25
Volume 25, Number 1, February 2022
- N. Suganthi, S. Meenakshi:
An efficient scheduling algorithm using queuing system to minimize starvation of non-real-time secondary users in Cognitive Radio Network. 1-11 - Pan Jun Sun:
The optimal privacy strategy of cloud service based on evolutionary game. 13-31 - Enrique Tomás Martínez Beltrán, Mario Quiles Pérez, Sergio López Bernal, Alberto Huertas Celdrán, Gregorio Martínez Pérez:
Noise-based cyberattacks generating fake P300 waves in brain-computer interfaces. 33-48 - Aya M. Kishk, Mahmoud Mohammed Badawy, Hesham A. Ali, Ahmed I. Saleh:
A new traffic congestion prediction strategy (TCPS) based on edge computing. 49-75 - Wenkai Ma, Jinchang Hu, Yanyan Wang, Yaohua Wu:
Simulation-based regression analysis for the replenishment strategy of the crane & shuttle-based storage and retrieval system. 77-89 - Masoumeh Hajvali, Sahar Adabi, Ali Rezaee, Mehdi Hosseinzadeh:
Software architecture for IoT-based health-care systems with cloud/fog service model. 91-118 - Ali Asghari, Mohammad Karim Sohrabi:
Combined use of coral reefs optimization and multi-agent deep Q-network for energy-aware resource provisioning in cloud data centers using DVFS technique. 119-140 - Abbas Najafizadeh, Afshin Salajegheh, Amir Masoud Rahmani, Amir Sahafi:
Multi-objective Task Scheduling in cloud-fog computing using goal programming approach. 141-165 - Ahmed Saidi, Omar Nouali, Abdelouahab Amira:
SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing. 167-185 - Jaiprakash Nagar, Sanjay Kumar Chaturvedi, Sieteng Soh:
An analytical framework with border effects to estimate the connectivity performance of finite multihop networks in shadowing environments. 187-202 - Hancui Zhang, Weida Zhou:
A two-stage virtual machine abnormal behavior-based anomaly detection mechanism. 203-214 - Ali Asghar Safaei:
Hybrid fragmentation of medical images' attributes for multidimensional indexing. 215-230 - Yousef O. Sharrab, Izzat Alsmadi, Nabil J. Sarhan:
Towards the availability of video communication in artificial intelligence-based computer vision systems utilizing a multi-objective function. 231-247 - Gaofeng Zhang, Benzhu Xu, Ensheng Liu, Liqiang Xu, Liping Zheng:
Task placement for crowd recognition in edge-cloud based urban intelligent video systems. 249-262 - Saleh Darzi, Bahareh Akhbari, Hassan Khodaiemehr:
LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid. 263-278 - Fernando Loor, Manuel Manriquez, Veronica Gil-Costa, Mauricio Marín:
Feasibility of P2P-STB based crowdsourcing to speed-up photo classification for natural disasters. 279-302 - Farhad Tavousi, Sadoon Azizi, Abdulbaghi Ghaderzadeh:
A fuzzy approach for optimal placement of IoT applications in fog-cloud computing. 303-320 - Ahmed Fathalla, Kenli Li, Ahmad Salah:
Best-KFF: a multi-objective preemptive resource allocation policy for cloud computing systems. 321-336 - Yanyan Ji, Bilin Shao, Jinyong Chang, Genqing Bian:
Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property. 337-349 - Mahyar Sadrishojaei, Nima Jafari Navimipour, Midia Reshadi, Mehdi Hosseinzadeh:
A new clustering-based routing method in the mobile internet of things using a krill herd algorithm. 351-361 - Yuejing Yan, Yanyan Xu, Yiran Zhang, Zhiheng Wang, Zheheng Rao:
Privacy-preserving content-based image retrieval in edge environment. 363-381 - Jianhu Gong, Nima Jafari Navimipour:
An in-depth and systematic literature review on the blockchain-based approaches for cloud computing. 383-400 - Ali Majed, Fatemeh Raji, Ali Miri:
Replication management in peer-to-peer cloud storage systems. 401-416 - Sumit Kumar, Rajeev Tiwari, Sergei A. Kozlov, Joel J. P. C. Rodrigues:
Minimizing delay in content-centric networks using heuristics-based in-network caching. 417-431 - KyungHyun Han, Wai-Kong Lee, Seong Oun Hwang:
cuGimli: optimized implementation of the Gimli authenticated encryption and hash function on GPU for IoT applications. 433-450 - Ashish Tomar, Sachin Tripathi:
Blockchain-assisted authentication and key agreement scheme for fog-based smart grid. 451-468 - Mouna Afif, Riadh Ayachi, Mohamed Atri:
Indoor objects detection system implementation using multi-graphic processing units. 469-483 - Mohammad Hossein Nejat, Homayun Motameni, Hamed Vahdat-Nejad, Behnam Barzegar:
Efficient cloud service ranking based on uncertain user requirements. 485-502 - S. Asha, P. Vinod:
Evaluation of adversarial machine learning tools for securing AI systems. 503-522 - Sami Alshmrany:
Adaptive learning style prediction in e-learning environment using levy flight distribution based CNN model. 523-536 - Kashif Mehboob Khan, Junaid Arshad, Waheed Iqbal, Sidrah Abdullah, Hassan Zaib:
Blockchain-enabled real-time SLA monitoring for cloud-hosted services. 537-559 - Wu Wang, Fouzi Harrou, Benamar Bouyeddou, Sidi-Mohammed Senouci, Ying Sun:
A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems. 561-578 - Ali Belgacem, Kadda Beghdad Bey:
Multi-objective workflow scheduling in cloud computing: trade-off between makespan and cost. 579-595 - Sejin Kim, Yoonhee Kim:
K-Scheduler: dynamic intra-SM multitasking management with execution profiles on GPUs. 597-617 - Feng Cheng, Yifeng Huang, Bhavana Tanpure, Pawan Sawalani, Long Cheng, Cong Liu:
Cost-aware job scheduling for cloud instances using deep reinforcement learning. 619-631 - Seongbong Choi, Hyung Tae Lee:
Attack and improvement of the recent identity-based encryption with authorized equivalence test in cluster computing. 633-646 - Shahid Md. Asif Iqbal, Asaduzzaman, Mohammed Moshiul Hoque:
A source-driven reinforcement learning-based Data reply strategy to reduce communication overhead in Named Data Networks (NDN). 647-673 - Avita Katal, Susheela Dahiya, Tanupriya Choudhury:
Energy efficiency in cloud computing data center: a survey on hardware technologies. 675-705 - Hang Gao, Tiegang Gao:
A secure lossless recovery for medical images based on image encoding and data self-embedding. 707-725 - Juan Dan, Yanjun Zheng, Jianping Hu:
Research on sports training model based on intelligent data aggregation processing in internet of things. 727-734
Volume 25, Number 2, April 2022
- Hamza Aldabbas, Khalaf Khatatneh:
Intelligent transmission control layer for efficient node management in SDN. 735-750 - Huifang Li, Jianghang Huang, Binyang Wang, Yushun Fan:
Weighted double deep Q-network based reinforcement learning for bi-objective multi-workflow scheduling in the cloud. 751-768 - Lin-Tao Duan, Zhi-Guo Wang, Hai-Ying Wang:
Energy-efficient speed tuning for real-time applications. 769-779 - Hongjian Li, Hai Fang, Hongxi Dai, Tao Zhou, Wenhu Shi, Jingjing Wang, Chen Xu:
A cost-efficient scheduling algorithm for streaming processing applications on cloud. 781-803 - Sumalatha Saleti:
Incremental mining of high utility sequential patterns using MapReduce paradigm. 805-825 - Himanshu Purohit, Pawan K. Ajmera:
Multi-modal biometric fusion based continuous user authentication for E-proctoring using hybrid LCNN-Salp swarm optimization. 827-846 - Peini Liu, Jordi Guitart:
Performance characterization of containerization for HPC workloads on InfiniBand clusters: an empirical study. 847-868 - Kamal Berahmand, Mehrnoush Mohammadi, Azadeh Faroughi, Rojiar Pir Mohammadiani:
A novel method of spectral clustering in attributed networks by constructing parameter-free affinity matrix. 869-888 - Krishan Kumar Sethi, Dharavath Ramesh, Munesh Chandra Trivedi:
A Spark-based high utility itemset mining with multiple external utilities. 889-909 - Aryan Rahimikhanghah, Melika Tajkey, Bahareh Rezazadeh, Amir Masoud Rahmani:
Resource scheduling methods in cloud and fog computing environments: a systematic literature review. 911-945 - Guilherme R. Pretto, Bruno Lopes Dalmazo, Jonatas Adilson Marques, Zhongke Wu, Xingce Wang, Vladimir Korkhov, Philippe O. A. Navaux, Luciano Paschoal Gaspary:
Janus: a framework to boost HPC applications in the cloud based on SDN path provisioning. 947-964 - Theofanis Xifilidis, Kostas E. Psannis:
Correlation-based wireless sensor networks performance: the compressed sensing paradigm. 965-981 - Ashish Mohan Yadav, Kuldeep Narayan Tripathi, S. C. Sharma:
An enhanced multi-objective fireworks algorithm for task scheduling in fog computing environment. 983-998 - Mahmoud Ahmad Al-Khasawneh, Irfan Uddin, Syed Atif Ali Shah, Ahmad M. Khasawneh, Laith Mohammad Abualigah, Marwan Mahmoud:
An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications. 999-1013 - Ali Aghasi, Kamal Jamshidi, Ali Bohlooli:
A thermal-aware energy-efficient virtual machine placement algorithm based on fuzzy controlled binary gravitational search algorithm (FC-BGSA). 1015-1033 - Reyhane Ghafari, F. Hassani Kabutarkhani, Najme Mansouri:
Task scheduling algorithms for energy optimization in cloud environment: a comprehensive review. 1035-1093 - Xi Liu, Jun Liu:
A truthful online mechanism for virtual machine provisioning and allocation in clouds. 1095-1109 - Siddhant Jain, Shashank Gupta, K. K. Sreelakshmi, Joel J. P. C. Rodrigues:
Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures. 1111-1154 - Naina Handa, Anil Sharma, Amardeep Gupta:
Framework for prediction and classification of non functional requirements: a novel vision. 1155-1173 - Degan Zhang, Lixiang Cao, Haoli Zhu, Ting Zhang, Jinyu Du, Kaiwen Jiang:
Task offloading method of edge computing in internet of vehicles based on deep reinforcement learning. 1175-1187 - K. Kalyana Chakravarthi, P. Neelakantan, L. Shyamala, Vaidehi V.:
Reliable budget aware workflow scheduling strategy on multi-cloud environment. 1189-1205 - Zhenxing Xu, Jinzhao Wu:
Computing flow pipe of embedded hybrid systems using deep group preserving scheme. 1207-1220 - Xuewang Zhang, Caijin Ye:
A novel privacy protection of permissioned blockchains with conditionally anonymous ring signature. 1221-1235 - Marjan Mahmoudi, Avid Avokh, Behrang Barekatain:
SDN-DVFS: an enhanced QoS-aware load-balancing method in software defined networks. 1237-1262 - Amrita Mangaonkar, Rohit Pawar, Nahida Sultana Chowdhury, Rajeev R. Raje:
Enhancing collaborative detection of cyberbullying behavior in Twitter data. 1263-1277 - Marco Lattuada, Eugenio Gianniti, Danilo Ardagna, Li Zhang:
Performance prediction of deep learning applications training in GPU as a service systems. 1279-1302 - Rashmi Sahay, G. Geethakumari, Barsha Mitra:
Mitigating the worst parent attack in RPL based internet of things. 1303-1320 - Jingzhao Xie, Run Zhou, Gang Sun, Jian Sun, Hongfang Yu:
Fast recovery for online service function chaining interruption using adaptive migration. 1321-1339 - Nitin Goyal, Ashok Kumar, Renu Popli, Lalit Kumar Awasthi, Nonita Sharma, Gaurav Sharma:
Priority based data gathering using multiple mobile sinks in cluster based UWSNs for oil pipeline leakage detection. 1341-1354 - Nilesh Vishwasrao Patil, C. Rama Krishna, Krishan Kumar:
SSK-DDoS: distributed stream processing framework based classification system for DDoS attacks. 1355-1372 - Dan Tang, Yudong Yan, Rui Dai, Zheng Qin, Jingwen Chen, Dongshuo Zhang:
A novel LDoS attack detection method based on reconstruction anomaly. 1373-1392 - Mohammad Hassan Khoobkar, Mehdi Dehghan Takht Fooladi, Mohammad Hossein Rezvani, Mohammad Mehdi Gilanian Sadeghi:
Partial offloading with stable equilibrium in fog-cloud environments using replicator dynamics of evolutionary game theory. 1393-1420 - Chunlin Li, Qianqian Cai, Youlong Luo:
Dynamic data replacement and adaptive scheduling policies in spark. 1421-1439 - Sivadi Balakrishna:
Multi objective-based incremental clustering by fast search technique for dynamically creating and updating clusters in large data. 1441-1457 - Marc Jordà, Pedro Valero-Lara, Antonio J. Peña:
cuConv: CUDA implementation of convolution for CNN inference. 1459-1473 - Amrendra Singh Yadav, Nikita Singh, Dharmender Singh Kushwaha:
Sidechain: storage land registry data using blockchain improve performance of search records. 1475-1495 - Xingyu Wang, Junzhao Du, Hui Liu:
Performance and isolation analysis of RunC, gVisor and Kata Containers runtimes. 1497-1513 - Nasim Naseri Seyedi Noudoust, Sahar Adabi, Ali Rezaee:
A quorum-based data consistency approach for non-relational database. 1515-1540 - Neha Goyal, Kapil Gupta:
A hierarchical laplacian TWSVM using similarity clustering for leaf classification. 1541-1560 - Retraction Note to: A fuzzy multi-objective immune genetic algorithm for the strategic location planning problem. 1561
Volume 25, Number 3, June 2022
- Izzat Alsmadi, Zyad Dwekat, Ricardo Cantu, Bilal Al-Ahmad:
Vulnerability assessment of industrial systems using Shodan. 1563-1573 - Simge Nur Aslan, Recep Ozalp, Aysegül Uçar, Cüneyt Güzelis:
New CNN and hybrid CNN-LSTM models for learning object manipulation of humanoid robots from demonstration. 1575-1590 - Faris A. Almalki, Marios C. Angelides:
An enhanced design of a 5G MIMO antenna for fixed wireless aerial access. 1591-1606 - Ala Abdulsalam Alarood, Nedal K. Al-Ababneh, Mahmoud Ahmad Al-Khasawneh, Majdi Rawashdeh, Mohammad Al-Omari:
IoTSteg: ensuring privacy and authenticity in internet of things networks using weighted pixels classification based image steganography. 1607-1618 - Mohammad Al Ja'afreh, Hikmat Adhami, Alaa Eddin Alchalabi, Mohamad Hoda, Abdulmotaleb El-Saddik:
Toward integrating software defined networks with the Internet of Things: a review. 1619-1636 - Simona Nedelcheva, Sofiya Ivanovska, Mariya K. Durchova, Petia D. Koprinkova-Hristova:
HPC parallel implementation combining NEST Simulator and Python modules. 1637-1644 - Andrii Salnikov, Balázs Kónya:
DNS-embedded service endpoint registry for distributed e-Infrastructures. 1645-1664 - Hasan Kivrak, Furkan Cakmak, Hatice Kose, Sirma Yavuz:
Waypoint based path planner for socially aware robot navigation. 1665-1675 - Lazar Mrkela, Zorica Stanimirovic:
A Multi-objective variable neighborhood search for the maximal covering location problem with customer preferences. 1677-1693 - Vahideh Hayyolalam, Safa Otoum, Öznur Özkasap:
Dynamic QoS/QoE-aware reliable service composition framework for edge intelligence. 1695-1713 - Dinesh Kumar Sah, Tu N. Nguyen, Korhan Cengiz, Braulio Dumba, Vikas Kumar:
Load-balance scheduling for intelligent sensors deployment in industrial internet of things. 1715-1727 - Kübra Seyhan, Tu N. Nguyen, Sedat Akleylek, Korhan Cengiz:
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey. 1729-1748 - Saddam Hussain, Syed Sajid Ullah, Ihsan Ali:
An efficient content source verification scheme for multi-receiver in NDN-based Internet of Things. 1749-1764 - Mamoun Alazab, Gunasekaran Manogaran, Carlos Enrique Montenegro-Marín:
Trust management for internet of things using cloud computing and security in smart cities. 1765-1777 - Sowmya Gali, Venkatram Nidumolu:
An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things. 1779-1789 - Xianhao Shen, Yufang Lu, Yi Zhang, Xiaoyong Liu, Lieping Zhang:
An Innovative Data Integrity Verification Scheme in the Internet of Things assisted information exchange in transportation systems. 1791-1803 - Roobaea Alroobaea, Rajakumar Arul, Saeed Rubaiee, Fahd S. Alharithi, Usman Tariq, Xincan Fan:
AI-assisted bio-inspired algorithm for secure IoT communication networks. 1805-1816 - Mark C. Ballandies, Marcus M. Dapp, Evangelos Pournaras:
Decrypting distributed ledger design - taxonomy, classification and blockchain community evaluation. 1817-1838 - Muhammad Umar Javed, Nadeem Javaid, Muhammad Waseem Malik, Mariam Akbar, Omaji Samuel, Adamu Sani Yahaya, Jalel Ben-Othman:
Blockchain based secure, efficient and coordinated energy trading and data sharing between electric vehicles. 1839-1867 - Abel O. Gomez Rivera, Deepak K. Tosh, Uttam Ghosh:
Resilient sensor authentication in SCADA by integrating physical unclonable function and blockchain. 1869-1883 - Baran Kiliç, Can C. Özturan, Alper Sen:
Parallel analysis of Ethereum blockchain transaction data using cluster computing. 1885-1898 - Debashis Das, Sourav Banerjee, Pushpita Chatterjee, Manju Biswas, Utpal Biswas, Waleed S. Alnumay:
Design and development of an intelligent transportation management system using blockchain and smart contracts. 1899-1913 - Gökay Saldamli, Charit Upadhyay, Devika Jadhav, Rohit Shrishrimal, Bapugouda Patil, Lo'ai Tawalbeh:
Improved gossip protocol for blockchain applications. 1915-1926 - Krushali Shah, Swapnil Chadotra, Sudeep Tanwar, Rajesh Gupta, Neeraj Kumar:
Blockchain for IoV in 6G environment: review solutions and challenges. 1927-1955 - Suayb S. Arslan, Turguy Goker:
Compress-store on blockchain: a decentralized data processing and immutable storage for multimedia streaming. 1957-1968 - Xiangyu Wang, Wenyong Wang, Youlu Zeng, Ting Yang, Chengyu Zheng:
A state sharding model on the blockchain. 1969-1979 - Farhad Soleimanian Gharehchopogh, Benyamin Abdollahzadeh:
An efficient harris hawk optimization algorithm for solving the travelling salesman problem. 1981-2005 - Darah Aqel, Shadi AlZu'bi, Ala Mughaid, Yaser Jararweh:
Extreme learning machine for plant diseases classification: a sustainable approach for smart agriculture. 2007-2020 - Elham Azhir, Nima Jafari Navimipour, Mehdi Hosseinzadeh, Arash Sharifi, Mehmet Unal, Aso Mohammad Darwesh:
Join queries optimization in the distributed databases using a hybrid multi-objective algorithm. 2021-2036 - Chouaib Ben Djaballah, Wahid Nouibat:
A new multi-population artificial bee algorithm based on global and local optima for numerical optimization. 2037-2059 - Abdullah Lakhan, Muhammad Suleman Memon, Qurat-Ul-Ain Mastoi, Mohamed Elhoseny, Mazin Abed Mohammed, Mumtaz Qabulio, Mohamed Abdel-Basset:
Cost-efficient mobility offloading and task scheduling for microservices IoVT applications in container-based fog cloud network. 2061-2083 - Albert Rego, Pedro Luis Gonzalez Ramirez, José Miguel Jiménez, Jaime Lloret Mauri:
Artificial intelligent system for multimedia services in smart home environments. 2085-2105 - Xiaoming Cheng, Lei Wang, Pengchao Zhang, Xinkuan Wang, Qunmin Yan:
Short-term fast forecasting based on family behavior pattern recognition for small-scale users load. 2107-2123 - Rasheed Ahmad, Izzat Alsmadi, Wasim Alhamdani, Lo'ai Tawalbeh:
Towards building data analytics benchmarks for IoT intrusion detection. 2125-2141 - Hafiz Munsub Ali, Jun Liu, Syed Ahmad Chan Bukhari, Hafiz Tayyab Rauf:
Planning a secure and reliable IoT-enabled FOG-assisted computing infrastructure for healthcare. 2143-2161 - Ángel Luis Perales Gómez, Pedro E. López-de-Teruel, Alberto Ruiz, Ginés García-Mateos, Gregorio Bernabé García, Félix J. García Clemente:
FARMIT: continuous assessment of crop quality using machine learning and deep learning techniques for IoT-based smart farming. 2163-2178 - Cristhian Martinez-Rendon, Diego Camarmas-Alonso, Jesús Carretero, José Luis González Compeán:
On the continuous contract verification using blockchain and real-time data. 2179-2201 - Wenbing Liang, Nan Ji:
Privacy challenges of IoT-based blockchain: a systematic review. 2203-2221 - Mohit Mohit, Sanmeet Kaur, Maninder Singh:
Design and implementation of transaction privacy by virtue of ownership and traceability in blockchain based supply chain. 2223-2240 - Rafal Skowronski, Jerzy Brzezinski:
SPIDE: sybil-proof, incentivized data exchange. 2241-2270 - Yishu Liu, Jiangbo Zheng:
Intelligent management of supply chain logistics based on 5g LoT. 2271-2280 - Maninderpal Singh, Gagangeet Singh Aujla, Rasmeet Singh Bali:
Derived blockchain architecture for security-conscious data dissemination in edge-envisioned Internet of Drones ecosystem. 2281-2302 - Darah Aqel, Shadi AlZu'bi, Ala Mughaid, Yaser Jararweh:
Correction to: Extreme learning machine for plant diseases classification: a sustainable approach for smart agriculture. 2303
Volume 25, Number 4, August 2022
- Yongli Tang, Yanpeng Ba, Lixiang Li, Xiaojun Wang, Xixi Yan:
Lattice-based public-key encryption with conjunctive keyword search in multi-user setting for IIoT. 2305-2316 - Aruna Guruvaya Mogarala, Mohammad Kamrul Hasan, Shayla Islam, Mohan Govindsa Kabadi, Preeta Sharan, Rosilah Hassan:
Cloud to cloud data migration using self sovereign identity for 5G and beyond. 2317-2331 - Rohit Sharma, Rajeev Arya:
A secure authentication technique for connecting different IoT devices in the smart city infrastructure. 2333-2349 - Anichur Rahman, Chinmay Chakraborty, Adnan Anwar, Md. Razaul Karim, Md. Jahidul Islam, Dipanjali Kundu, Ziaur Rahman, Shahab S. Band:
SDN-IoT empowered intelligent framework for industry 4.0 applications during COVID-19 pandemic. 2351-2368 - Omar A. Alzubi, Jafar Ahmad Abed Alzubi, Ala' M. Al-Zoubi, Mohammad A. Hassonah, Utku Kose:
An efficient malware detection approach with feature weighting based on Harris Hawks optimization. 2369-2387 - Wenqi Zhou, Lunyuan Chen, Shunpu Tang, Lijia Lai, Junjuan Xia, Fasheng Zhou, Liseng Fan:
Offloading strategy with PSO for mobile edge computing based on cache mechanism. 2389-2401 - Tahir Ahmad, Sher Ali, Syed Bilal Hussian Shah, Inam Ullah Khan, Muhammad Abul Hassan, Syed Irfan Ullah:
Joint mode selection and user association in D2D enabled multitier C-RAN. 2403-2415 - Lunyuan Chen, Rui Zhao, Ke He, Zichao Zhao, Liseng Fan:
Intelligent ubiquitous computing for future UAV-enabled MEC network systems. 2417-2427 - Ehzaz Mustafa, Junaid Shuja, Sardar Khaliq uz Zaman, Ali Imran Jehangiri, Sadia Din, Faisal Rehman, Saad Mustafa, Tahir Maqsood, Abdul Nasir Khan:
Joint wireless power transfer and task offloading in mobile edge computing: a survey. 2429-2448 - Mazin Mohammed Mogadem, Yan Li, Daniel Limenew Meheretie:
A survey on internet of energy security: related fields, challenges, threats and emerging technologies. 2449-2485 - Gianni D'Angelo, Francesco Palmieri, Antonio Robustelli:
A federated approach to Android malware classification through Perm-Maps. 2487-2500 - Sharief Abdel-Razeq, Haitham Moffaqq Al-Obiedollah, Haythem Bany Salameh:
Efficient user-channel pairing with power-domain sum-rate maximization in opportunistic hybrid OFDMA-NOMA IoT systems. 2501-2514 - Jianlong Xu, Jian Lin, Wei Liang, Kuan-Ching Li:
Privacy preserving personalized blockchain reliability prediction via federated learning in IoT environments. 2515-2526 - Yishu Liu, Wenjie Zhang, Qi Zhang, Monire Norouzi:
An optimized human resource management model for cloud-edge computing in the internet of things. 2527-2539 - Rania A. Mokhtar, Rashid A. Saeed, Hesham Alhumyani, Mashael Khayyat, Sayed Abdel-Khalek:
Cluster mechanism for sensing data report using robust collaborative distributed spectrum sensing. 2541-2556 - Subramani Jegadeesan, Mohammad S. Obaidat, Pandi Vijayakumar, Maria Azees, Marimuthu Karuppiah:
Efficient privacy-preserving anonymous authentication scheme for human predictive online education system. 2557-2571 - Jingbin Liu, Bing Jia, Lei Guo, Baoqi Huang, Lei Wang, Thar Baker:
CTSLoc: an indoor localization method based on CNN by using time-series RSSI. 2573-2584 - Dong Li, Zai Luo, Bo Cao:
Blockchain-based federated learning methodologies in smart environments. 2585-2599 - Fei Yin, Feng Shi:
Cluster optimization algorithm based on CPU and GPU hybrid architecture. 2601-2611 - Amir Javadpour, Ali Majed Hossein Abadi, Samira Rezaei, Mozhdeh Zomorodian, Ali Shokouhi Rostami:
Improving load balancing for data-duplication in big data cloud computing networks. 2613-2631 - Jiaqin Lin, Anghong Xiao, Shoubin Dong, Jing Zhou:
Spark-ITGO: a parallel invasive tumor growth optimization algorithm on spark. 2633-2660 - Abdul Jabbar Saeed Tipu, Padraig Ó Conbhuí, Enda Howley:
Applying neural networks to predict HPC-I/O bandwidth over seismic data on lustre file system for ExSeisDat. 2661-2682 - Alexey V. Medvedev:
IMB-ASYNC: a revised method and benchmark to estimate MPI-3 asynchronous progress efficiency. 2683-2697 - Qirui Li, Zhiping Peng, Delong Cui, Jianpeng Lin, Jieguang He:
Two-stage selection of distributed data centers based on deep reinforcement learning. 2699-2714 - Chongke Wu, Sicong Shao, Cihan Tunc, Pratik Satam, Salim Hariri:
An explainable and efficient deep learning framework for video anomaly detection. 2715-2737 - Junichi Sakamoto, Shungo Hayashi, Daisuke Fujimoto, Tsutomu Matsumoto:
Constructing software countermeasures against instruction manipulation attacks: an approach based on vulnerability evaluation using fault simulator. 2739-2753 - Hamza Ouarnoughi, Emmanuelle Grislin-Le Strugeon, Smaïl Niar:
Simulating multi-agent-based computation offloading for autonomous cars. 2755-2766 - Shalaka Satam, Pratik Satam, Jesus Pacheco, Salim Hariri:
Security framework for smart cyber infrastructure. 2767-2778 - Zaineb Sakhrawi, Asma Sellami, Nadia Bouassida:
Software enhancement effort estimation using correlation-based feature selection and stacking ensemble method. 2779-2792 - Chiara Bachechi, Federica Rollo, Laura Po:
Detection and classification of sensor anomalies for simulating urban traffic scenarios. 2793-2817 - Dimitri Saingre, Thomas Ledoux, Jean-Marc Menaud:
Measuring performances and footprint of blockchains with BCTMark: a case study on Ethereum smart contracts energy consumption. 2819-2837 - Jiahui Chen, Joe Breen, Jeff M. Phillips, Jacobus E. van der Merwe:
Practical and configurable network traffic classification using probabilistic machine learning. 2839-2853 - Joseph White-Swift, Andrea Fumagalli:
DDD: Distributed Dataset DNS. 2855-2872 - George Papadimitriou, Eric Lyons, Cong Wang, Komal Thareja, Ryan Tanaka, Paul Ruth, Ivan Rodero, Ewa Deelman, Michael Zink, Anirban Mandal:
Fair sharing of network resources among workflow ensembles. 2873-2891 - Janet Vorobyeva, Daniel R. Delayo, Michael A. Bender, Martin Farach-Colton, Prashant Pandey, Cynthia A. Phillips, Shikha Singh, Eric D. Thomas, Thomas M. Kroeger:
Using advanced data structures to enable responsive security monitoring. 2893-2914 - Sugeerth Murugesan, Mariam Kiran, Bernd Hamann, Gunther H. Weber:
Netostat: analyzing dynamic flow patterns in high-speed networks. 2915-2930 - Yuanlong Tan, Malathi Veeraraghavan, Hwajung Lee, Steven Emmerson, Jack W. Davidson:
High-performance reliable network-multicast over a trial deployment. 2931-2952 - Sara Shakeri, Lourens E. Veen, Paola Grosso:
Multi-domain network infrastructure based on P4 programmable devices for Digital Data Marketplaces. 2953-2966 - Jennifer M. Schopf, Katrina Turner, Daniel Doyle, Andrew Lake, Jason Leigh, Brian L. Tierney:
The NetSage measurement and analysis framework in practice. 2967-2990 - Se-Young Yu, Jim Hao Chen, Fei Yeh, Joe Mambretti, Xiao Wang, Anna Giannakou, Eric Pouyoul, Marc Lyonnais:
Analysis of NVMe over fabrics with SCinet DTN-as-a-Service. 2991-3003 - Luyao Chang, Fan Li, Xinzheng Niu, Jiahui Zhu:
On an improved clustering algorithm based on node density for WSN routing protocol. 3005-3017 - Aiqin Hou, Chase Q. Wu, Qiang Duan, Dawei Quan, Liudong Zuo, Yangyang Li, Michelle M. Zhu, Dingyi Fang:
SDN-based bandwidth scheduling for prioritized data transfer between data centers. 3019-3034 - Rohit Sharma, Rajeev Arya:
Correction to: A secure authentication technique for connecting different IoT devices in the smart city infrastructure. 3035
Volume 25, Number 5, October 2022
- Rabeeha Fazal, Munam Ali Shah, Hasan Ali Khattak, Hafiz Tayyab Rauf, Fadi M. Al-Turjman:
Achieving data privacy for decision support systems in times of massive data sharing. 3037-3049 - Chengfeng Jian, Lukun Bao, Meiyu Zhang:
A high-efficiency learning model for virtual machine placement in mobile edge computing. 3051-3066 - Yixin Chen, Jinyong Chang:
Identity-based proof of retrievability meets with identity-based network coding. 3067-3083 - M. R. Rajeshwari, K. S. Kavitha:
Arrhythmia ventricular fibrillation classification on ECG signal using ensemble feature selection and deep neural network. 3085-3102 - Rahul Mishra, Dharavath Ramesh, Damodar Reddy Edla, Munesh Chandra Trivedi:
Blockchain assisted privacy-preserving public auditable model for cloud environment with efficient user revocation. 3103-3127 - Gavini Sreelatha, A. Vinaya Babu, Divya Midhunchakkaravarthy:
Improved security in cloud using sandpiper and extended equilibrium deep transfer learning based intrusion detection. 3129-3144 - Ajitha K. M, N. Chenthalir Indra:
Fisher linear discriminant and discrete global swarm based task scheduling in cloud environment. 3145-3160 - Donghong Xu, Zhongbin Sun:
An adaptive function placement in serverless computing. 3161-3174 - Vijay Kumar Yadav, Shekhar Verma, S. Venkatesan:
Efficient and privacy-preserving location-based services over the cloud. 3175-3192 - Kamalakant Laxman Bawankule, Rupesh Kumar Dewang, Anil Kumar Singh:
Historical data based approach to mitigate stragglers from the Reduce phase of MapReduce in a heterogeneous Hadoop cluster. 3193-3211 - Babak Narimanjahan, Midia Reshadi, Ahmad Khademzadeh, Akram Reza:
MCPS: a mapping method for MAERI accelerator base on Cartesian Product based Convolution for DNN layers with sparse input feature map. 3213-3230 - Anuradha Dhull, Akansha Singh, Krishna Kant Singh:
An intelligent technique for pattern-based clustering of continuous-valued datasets. 3231-3248 - Elaheh Gavagsaz:
Weighted spatial skyline queries with distributed dominance tests. 3249-3264 - Xiaojian He, Junmin Shen, Fagui Liu, Bin Wang, Guoxiang Zhong, Jun Jiang:
A two-stage scheduling method for deadline-constrained task in cloud computing. 3265-3281 - Ankit Verma, Gaurav Agarwal, Amit Kumar Gupta:
A novel generalized fuzzy intelligence-based ant lion optimization for internet of things based disease prediction and diagnosis. 3283-3298 - Mahdi Ajdani, Hamid Reza Ghaffary:
Improving network intrusion detection by identifying effective features based on probabilistic dependency trees and evolutionary algorithm. 3299-3311 - Yanni Wang, Xiang Liu, Rongchun Guo:
An object detection algorithm based on the feature pyramid network and single shot multibox detector. 3313-3324 - Simar Preet Singh, Rajesh Kumar, Anju Sharma, Jemal H. Abawajy, Ravneet Kaur:
Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing. 3325-3342 - Anayo Chukwu Ikegwu, Henry Friday Nweke, Chioma Virginia Anikwe, Uzoma Rita Alo, Obikwelu Raphael Okonkwo:
Big data analytics for data-driven industry: a review of data sources, tools, challenges, solutions, and research directions. 3343-3387 - Xuejie Zhang, Jie Li, Guibing Li, Weidong Li:
Generalized asset fairness mechanism for multi-resource fair allocation mechanism with two different types of resources. 3389-3403 - Sana Aurangzeb, Haris Anwar, Muhammad Asif Naeem, Muhammad Aleem:
BigRC-EML: big-data based ransomware classification using ensemble machine learning. 3405-3422 - Masomeh Azimzadeh, Ali Rezaee, Somayyeh Jafarali Jassbi, Mehdi Esnaashari:
Placement of IoT services in fog environment based on complex network features: a genetic-based approach. 3423-3445 - N. G. Bhuvaneswari Amma:
A vector convolutional deep autonomous learning classifier for detection of cyber attacks. 3447-3458 - Md. Nayer, Subhash Chandra Pandey:
Chromosomes identification based differential evolution (CIDE): a new bio-inspired variant for network intrusion detection. 3459-3480 - Xingwang Huang, Yangbin Lin, Zongliang Zhang, Xiaoxi Guo, Shubin Su:
A gradient-based optimization approach for task scheduling problem in cloud computing. 3481-3497 - Muhammad Khan, Ali Imran Jehangiri, Zulfiqar Ahmad, Mohammed Ala'Anzy, Asif Umer:
An exploration to graphics processing unit spot price prediction. 3499-3515 - Prabhakara Rao Kapula, P. V. Sridevi:
Channel estimation in 5G multi input multi output wireless communication using optimized deep neural framework. 3517-3530 - Narges Akhound, Sahar Adabi, Ali Rezaee, Amir Masoud Rahmani:
Clustering of mobile IoT nodes with support for scheduling of time-sensitive applications in fog and cloud layers. 3531-3559 - Esmaeil Torabi, Mostafa Ghobaei-Arani, Ali Shahidinejad:
Data replica placement approaches in fog computing: a review. 3561-3589 - Hui Yu, Junqing Li, Xiao-long Chen, Wei Niu, Hong-yan Sang:
An improved multi-objective imperialist competitive algorithm for surgical case scheduling problem with switching and preparation times. 3591-3616 - Shadi AlZu'bi, Darah Aqel, Mohammad Lafi:
An intelligent system for blood donation process optimization - smart techniques for minimizing blood wastages. 3617-3627 - Meryem Ammi, Oluwasegun A. Adedugbe, Fahad M. Al-Harby, Elhadj Benkhelifa:
Leveraging a cloud-native architecture to enable semantic interconnectedness of data for cyber threat intelligence. 3629-3640 - Shumin Han, Derong Shen, Tiezheng Nie, Yue Kou, Ge Yu:
An enhanced privacy-preserving record linkage approach for multiple databases. 3641-3652 - Simarjit Kaur, Anju Bala, Anshu Parashar:
Intelligent energy aware approaches for residential buildings: state-of-the-art review and future directions. 3653-3670 - Nourchène Ouerhani, Ahmed Maalel, Henda Ben Ghézala:
SMAD: SMart assistant during and after a medical emergency case based on deep learning sentiment analysis. 3671-3681 - Amal Kouicem, Mohamed Essaid Khanouche, Abdelkamel Tari:
Novel bat algorithm for QoS-aware services composition in large scale internet of things. 3683-3697 - Nitish Andola, Sourabh Prakash, Raghav Gahlot, S. Venkatesan, Shekhar Verma:
An enhanced smart card and dynamic ID based remote multi-server user authentication scheme. 3699-3717 - Yun Liu, Xiao Zhang, Binbin Liu, Xiaonan Zhao:
The research and analysis of efficiency of hardware usage base on HDFS. 3719-3732 - Shahnawaz Ahmad, Shabana Mehfuz, Fateh Mebarek-oudina, Javed Beg:
RSM analysis based cloud access security broker: a systematic literature review. 3733-3763 - Rashmi Sahay, G. Geethakumari, Barsha Mitra:
Correction: Mitigating the worst parent attack in RPL based internet of things. 3765
Volume 25, Number 6, December 2022
- Ahmad Taghinezhad-Niar, Saeid Pashazadeh, Javid Taheri:
QoS-aware online scheduling of multiple workflows under task execution time uncertainty in clouds. 3767-3784 - Xiaobing Guo, Zhili Du, Shunfu Jin:
Nash equilibrium and social optimization of a task offloading strategy with real-time virtual machine repair in an edge computing system. 3785-3797 - Tajinder Singh, Madhu Kumari, Daya Sagar Gupta:
Real-time event detection and classification in social text steam using embedding. 3799-3817 - Ala Mughaid, Shadi AlZu'bi, Adnan Hnaif, Salah Taamneh, Asma Alnajjar, Esraa Abu Elsoud:
An intelligent cyber security phishing detection system using deep learning techniques. 3819-3828 - Gordhan Jethava, Udai Pratap Rao:
A novel trust prediction approach for online social networks based on multifaceted feature similarity. 3829-3843 - Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit Kumar Awasthi, Emmanuel S. Pilli:
Energy-aware scientific workflow scheduling in cloud environment. 3845-3874 - Meriem Amel Guessoum, Rahma Djiroun, Kamel Boukhalfa, Elhadj Benkhelifa:
Natural language why-question in Business Intelligence applications: model and recommendation approach. 3875-3898 - Zhiwei Wu, Runhua Shi, Kunchang Li, Yifan Yang:
Attribute-based data access control scheme with secure revocation in fog computing for smart grid. 3899-3913 - Shanmukha Makani, Rachitha Pittala, Eitaa Alsayed, Moayad Aloqaily, Yaser Jararweh:
A survey of blockchain applications in sustainable and smart cities. 3915-3936 - Rajni Jindal, Indu Singh:
Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining. 3937-3959 - Linh Manh Pham, Nguyen-Tuan-Thanh Le, Xuan-Truong Nguyen:
Multi-level just-enough elasticity for MQTT brokers of Internet of Things applications. 3961-3976 - Xin Yang, Hengrui Li, Xiaochuan Li:
Lightweight image super-resolution with feature cheap convolution and attention mechanism. 3977-3992 - Fadi Wedyan, Reema Freihat, Maen Hammad:
Visualization of aspect-oriented programs using city transportation metaphor. 3993-4008 - V. S. Prakash, V. Vinothina, K. Kalaiselvi, K. Velusamy:
An improved bacterial colony optimization using opposition-based learning for data clustering. 4009-4025 - Ridhima Rani, Meenu Khurana, Ajay Kumar, Neeraj Kumar:
Big data dimensionality reduction techniques in IoT: review, applications and open research challenges. 4027-4049 - Linda Ouchaou, Hassina Nacer, Chahrazed Labba:
Towards a distributed SaaS management system in a multi-cloud environment. 4051-4071 - Linda Ouchaou, Hassina Nacer, Chahrazed Labba:
Correction: Towards a distributed SaaS management system in a multi-cloud environment. 4073 - Zareen Alamgir, Farwa K. Khan, Saira Karim:
Federated recommenders: methods, challenges and future. 4075-4096 - Mehdi Hosseinzadeh, Atefeh Hemmati, Amir Masoud Rahmani:
Clustering for smart cities in the internet of things: a review. 4097-4127 - Sujith Samuel Mathew, Kadhim Hayawi, Nahom Aron Dawit, Ikbal Taleb, Zouheir Trabelsi:
Integration of blockchain and collaborative intrusion detection for secure data transactions in industrial IoT: a survey. 4129-4149 - Syed Zaffar Qasim, Muhammad Ali Ismail:
DOCEA/D: Dual-Operator-based Constrained many-objective Evolutionary Algorithm based on Decomposition. 4151-4169 - K. Siddesha, G. V. Jayaramaiah, Chandrapal Singh:
A novel deep reinforcement learning scheme for task scheduling in cloud computing. 4171-4188 - Monika, Rajesh Bhatia, Arnav Jain, Baljeet Singh:
Hash time locked contract based asset exchange solution for probabilistic public blockchains. 4189-4201 - Jie Zhang, Mingjie Piao, Degan Zhang, Ting Zhang, Wen-miao Dong:
An approach of multi-objective computing task offloading scheduling based NSGS for IOV in 5G. 4203-4219 - Mohammed Otair, Areej Alhmoud, Heming Jia, Maryam Altalhi, Ahmad MohdAziz Hussein, Laith Abualigah:
Optimized task scheduling in cloud computing using improved multi-verse optimizer. 4221-4232 - Madhu Sudan Kumar, Anubhav Choudhary, Indrajeet Gupta, Prasanta K. Jana:
An efficient resource provisioning algorithm for workflow execution in cloud platform. 4233-4255 - Navjeet Kaur, Ashok Kumar, Rajesh Kumar:
TRAP: task-resource adaptive pairing for efficient scheduling in fog computing. 4257-4273 - Hemanta Kumar Bhuyan, Vinayakumar Ravi, M. Srikanth Yadav:
Multi-objective optimization-based privacy in data mining. 4275-4287 - Isabel Herrera Montano, José J. García-Aranda, Juan Ramos-Díaz, Sergio Molina-Cardín, Isabel de la Torre Díez, Joel J. P. C. Rodrigues:
Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat. 4289-4302 - Niveditta Thakur, Nafis Uddin Khan, Sunil Datt Sharma:
An efficient fuzzy inference system based approximated anisotropic diffusion for image de-noising. 4303-4323 - Zhanyou Ma, Qiannan Si, Yilin Liu, Shunzhi Wang:
Performance analysis of P2P networks with malicious nodes. 4325-4337 - Asal Ramezani, Maryam Rajabzadeh Asaar:
An identity-based public auditing protocol in cloud-assisted IoT. 4339-4354 - Sharif Naser Makhadmeh, Ammar Kamal Abasi, Mohammed Azmi Al-Betar, Mohammed A. Awadallah, Iyad Abu Doush, Zaid Abdi Alkareem Alyasseri, Osama Ahmad Alomari:
A novel link-based Multi-objective Grey Wolf Optimizer for Appliances Energy Scheduling Problem. 4355-4382 - Monika, Om Prakash Sangwan:
A framework for evaluating cloud computing services using AHP and TOPSIS approaches with interval valued spherical fuzzy sets. 4383-4396 - Jing Chen, Hongbo Yang, Nana Wei, Mingxin Liu:
User behavior analysis based on edge evolutionary game model in social network. 4397-4412 - Qi Wang, Yinsheng Luo:
Research on a new power distribution control strategy of hybrid energy storage system for hybrid electric vehicles based on the subtractive clustering and adaptive fuzzy neural network. 4413-4422 - Sunggon Kim, Alex Sim, Kesheng Wu, Suren Byna, Yongseok Son:
Design and implementation of dynamic I/O control scheme for large scale distributed file systems. 4423-4438 - Guilherme Galante, Rodrigo da Rosa Righi:
Adaptive parallel applications: from shared memory architectures to fog computing (2002-2022). 4439-4461 - Shashi Raj, Dharavath Ramesh:
PartEclat: an improved Eclat-based frequent itemset mining algorithm on spark clusters using partition technique. 4463-4480 - Supriya Agrahari, Anil Kumar Singh:
Adaptive PCA-based feature drift detection using statistical measure. 4481-4494 - Abdul Razzaq:
Blockchain-based secure data transmission for internet of underwater things. 4495-4514 - Mirko Zichichi, Stefano Ferretti, Gabriele D'Angelo, Víctor Rodríguez-Doncel:
Data governance through a multi-DLT architecture in view of the GDPR. 4515-4542 - Rakesh Salam, Ansuman Bhattacharya:
Efficient greedy heuristic approach for fault-tolerant distributed controller placement in scalable SDN architecture. 4543-4572 - Sushmita Sharma, Apu Kumar Saha, Susmita Roy, Seyedali Mirjalili, Sukanta Nama:
A mixed sine cosine butterfly optimization algorithm for global optimization and its application. 4573-4600 - V. Anandhi, P. Vinod, Varun G. Menon, Korankotte Manoj Aditya:
Performance evaluation of deep neural network on malware detection: visual feature approach. 4601-4615 - Yungui Chen, Li Feng, Hong Liang, Shumin Yao, Liwei Tian, Xiaochen Yuan:
RS-chain: a decentralized reputation-sharing framework for group-buying industry via hybrid blockchain. 4617-4632 - Wenbing Zhang, Li Xu, Zhenzhong Shen, Baotai Ma:
A new approach for mechanical parameter inversion analysis of roller compacted concrete dams using modified PSO and RBFNN. 4633-4652 - Mohammad Reza Alizadeh, Vahid Khajehvand, Amir Masoud Rahmani, Ebrahim Akbari:
TPEL: Task possible execution level for effective scheduling in fog-cloud environment. 4653-4672
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.