default search action
Cluster Computing, Volume 27
Volume 27, Number 1, February 2024
- Devon Myers, Rami Mohawesh, Venkata Ishwarya Chellaboina, Anantha Lakshmi Sathvik, Praveen Venkatesh, Yi-Hui Ho, Hanna Henshaw, Muna Al-Hawawreh, David Berdik, Yaser Jararweh:
Foundation and large language models: fundamentals, challenges, opportunities, and social impacts. 1-26 - Kamta Nath Mishra, Vandana Bhattacharjee, Shashwat Saket, Shivam P. Mishra:
Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach. 27-52 - Sanna Mehraj Kak, Parul Agarwal, M. Afshar Alam, Farheen Siddiqui:
A hybridized approach for minimizing energy in cloud computing. 53-70 - Abdul Jabbar Saeed Tipu, Padraig Ó Conbhuí, Enda Howley:
Artificial neural networks based predictions towards the auto-tuning and optimization of parallel IO bandwidth in HPC system. 71-90 - Peng Zhou, Longxin Lin, Zhen Zhang, Yuhui Deng, Tengjiao He:
GHB: a cost-effective and energy-efficient data center network structure with greater incremental scalability. 91-107 - Puneet Sharma, Manoj Kumar, Ashish Sharma:
Machine learning based file type classifier designing in IoT cloud. 109-117 - Yuan Zhao, Kang Chen, Zhisheng Ye, Zhiyu Xiang, Qi Lu:
Multi-input cloud resource allocation strategy with limited buffer and virtual machine synchronization failure. 119-135 - Yunwei Jia, Keke Lu, Xia Li, Chenxiang Hao:
SRG: a clustering algorithm based on scale division and region growing. 137-157 - Maribell Sacanamboy:
Heuristic algorithm for task mapping problem in a hierarchical wireless network-on-chip architecture. 159-175 - Chunlin Li, Kun Jiang, Xinyong Li, Libin Zhang, Youlong Luo:
Single-tag and multi-tag RFID data cleaning approach in edge computing. 177-197 - Maryam Mirzapour-Moshizi, Vahid Sattari Naeini, Amir Sabbagh Molahosseini:
Application placement in fog-cum-cloud environment based on a low latency policy-making framework. 199-217 - Ankur Jain, Chandrashekar Jatoth, G. R. Gangadharan:
Bi-level optimization of resource allocation and appliance scheduling in residential areas using a Fog of Things (FOT) framework. 219-229 - Malik Braik:
Hybrid enhanced whale optimization algorithm for contrast and detail enhancement of color images. 231-267 - Prakhar Sharma, W. Wilfred Godfrey, Aditya Trivedi:
When blockchain meets IoT: a comparison of the performance of communication protocols in a decentralized identity solution for IoT using blockchain. 269-284 - Lacchita Soni, Harish Chandra, Daya Sagar Gupta, Ram Keval:
Quantum-resistant public-key encryption and signature schemes with smaller key sizes. 285-297 - Ali Hamdan Alenezi, Mahmoud Nazzal, Ahmed Sawalmeh, Abdallah Khreishah, Sihua Shao, Muhannad Almutiry:
Machine learning regression-based RETRO-VLP for real-time and stabilized indoor positioning. 299-311 - Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, José Rafael Buendía Rubio, Gérôme Bovet, Gregorio Martínez Pérez:
Robust Federated Learning for execution time-based device model identification under label-flipping attack. 313-324 - Ahmed Cherif Mazari, Nesrine Boudoukhani, Abdelhamid Djeffal:
BERT-based ensemble learning for multi-aspect hate speech detection. 325-339 - Mahfooz Alam, Mohammad Shahid, Suhel Mustajab:
Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment. 341-376 - Chao Jing, Jiaming Li:
CBLA_PM: an improved ann-based power consumption prediction algorithm for multi-type jobs on heterogeneous computing server. 377-394 - Ramraj Dangi, Praveen Lalwani:
Harris Hawks optimization based hybrid deep learning model for efficient network slicing in 5G network. 395-409 - Xian Wu, Wenju Zhou, Minrui Fei, Yonglu Du, Huiyu Zhou:
Banyan tree growth optimization and application. 411-441 - Rahim Sadigov, Elif Yildirim, Büsra Kocaçinar, Fatma Patlar Akbulut, Cagatay Catal:
Deep learning-based user experience evaluation in distance learning. 443-455 - Qinlu He, Fan Zhang, Genqing Bian, Weiqi Zhang, Zhen Li, Zhimin Yu, Hao Feng:
File block multi-replica management technology in cloud storage. 457-476 - Liang Yang, Rong Jiang, Xuetao Pu, Chenguang Wang, Yue Yang, Meng Wang, Lin Zhang, Feifei Tian:
An access control model based on blockchain master-sidechain collaboration. 477-497 - Prashant G. Ahire, Pramod D. Patil:
CAC-WOA: context aware clustering with whale optimization algorithm for knowledge discovery from multidimensional space in electricity application. 499-513 - Haiying Liu, Kun Wu, Kuihua Huang, Guangquan Cheng, Rui Wang, Guohua Liu:
Optimization of large-scale UAV cluster confrontation game based on integrated evolution strategy. 515-529 - Nisha Pal, Mahendra Pratap Yadav, Dharmendra Kumar Yadav:
Appropriate number of analogues in analogy based software effort estimation using quality datasets. 531-546 - Zaid Albataineh, Fatima Aldrweesh, Mohammad A. Alzubaidi:
COVID-19 CT-images diagnosis and severity assessment using machine learning algorithm. 547-562 - Lavanya Settipalli, G. R. Gangadharan, Sivaiah Bellamkonda:
An extended lightweight blockchain based collaborative healthcare system for fraud prevention. 563-573 - Abdelhak Goudjil, Mathieu Pouliquen, Eric Pigeon, Olivier Gehan:
On-line outer bounding ellipsoid algorithm for clustering of hyperplanes in the presence of bounded noise. 575-587 - Chengfeng Jian, Zhuoyang Pan, Lukun Bao, Meiyu Zhang:
Online-learning task scheduling with GNN-RL scheduler in collaborative edge computing. 589-605 - Paluck Arora, Rajesh Mehta, Rohit Ahuja:
An adaptive medical image registration using hybridization of teaching learning-based optimization with affine and speeded up robust features with projective transformation. 607-627 - Zakaria Alomari, Mohammad Al-Oudat, Suboh Alkhushayni:
Pricing the cloud based on multi-attribute auction mechanism. 629-654 - Ramesh Vatambeti, Srihari Varma Mantena, K. V. D. Kiran, M. Manohar, Chinthakunta Manjunath:
Twitter sentiment analysis on online food services based on elephant herd optimization with hybrid deep learning technique. 655-671 - Rashmi Kushwah:
A novel traffic aware reliable gateway selection in wireless mesh network. 673-687 - Bhushan Inje, Kapil Kumar Nagwanshi, Radha Krishna Rambola:
An efficient document information retrieval using hybrid global search optimization algorithm with density based clustering technique. 689-705 - Rima Grati, Faiza Loukil, Khouloud Boukadi, Mourad Abed:
A blockchain-based framework for circular end-of-life vehicle processing. 707-720 - Shamsher Ullah, Jiangbin Zheng, Muhammad Tanveer Hussain, Muhammad Wasif Sardar, Muhammad Umar Farooq, Salabat Khan:
An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing. 721-735 - Sofian Kassaymeh, Mohammed Alweshah, Mohammed Azmi Al-Betar, Abdelaziz I. Hammouri, Mohammad Atwah Al-Ma'aitah:
Software effort estimation modeling and fully connected artificial neural network optimization using soft computing techniques. 737-760 - Rayees Ahamad, Kamta Nath Mishra:
Hybrid approach for suspicious object surveillance using video clips and UAV images in cloud-IoT-based computing environment. 761-785 - Nazli Gulum Mutlu, Serkan Altuntas:
Analyzing factors influencing the severity of occupational accidents in textile industry using decision tree algorithms. 787-825 - Mahshid Rezakhani, Nazanin Sarrafzadeh-Ghadimi, Reza Entezari-Maleki, Leonel Sousa, Ali Movaghar:
Energy-aware QoS-based dynamic virtual machine consolidation approach based on RL and ANN. 827-843 - Mansoureh Zare, Yasser Elmi Sola, Hesam Hasanpour:
Imperialist competitive based approach for efficient deployment of IoT services in fog computing. 845-858 - Mingliang Gao, Alireza Souri, Mayram Zaker, Wenzhe Zhai, Xiangyu Guo, Qilei Li:
A comprehensive analysis for crowd counting methodologies and algorithms in Internet of Things. 859-873 - Assia Brighen, Hachem Slimani, Abdelmounaam Rezgui, Hamamache Kheddouci:
A new distributed graph coloring algorithm for large graphs. 875-891 - Muhammad Faraz Hyder, Tasbiha Fatima, Saadia Arshad:
Towards adding digital forensics capabilities in software defined networking based moving target defense. 893-912 - Jiahui Ma, Jinxiang Chen, Ligang Dong, Xian Jiang:
Research on placement of distributed SDN multiple controllers based on IAVOA. 913-930 - Gunaganti Sravanthi, Nageswara Rao Moparthi:
Dual Interactive Wasserstein Generative Adversarial Network optimized with arithmetic optimization algorithm-based job scheduling in cloud-based IoT. 931-944 - Sarah Alhozaimy, Daniel A. Menascé, Massimiliano Albanese:
Design and modeling of moving target defense in workflow-based applications. 945-958 - Poly Sil Sen, Nandini Mukherjee:
An ontology-based approach to designing a NoSQL database for semi-structured and unstructured health data. 959-976 - Hela Taktak, Khouloud Boukadi, Firas Zouari, Chirine Ghedira Guégan, Michael Mrissa, Faïez Gargouri:
A knowledge-driven service composition framework for wildfire prediction. 977-996 - Debadatta Naik, Ramesh Dharavath, Lianyong Qi:
Quantum-PSO based unsupervised clustering of users in social networks using attributes. 997-1015 - Tianqi Bu, Zanyu Huang, Kairui Zhang, Yang Wang, Haobin Song, Jietong Zhou, Zhangjun Ren, Sen Liu:
Task scheduling in the internet of things: challenges, solutions, and future trends. 1017-1046 - Jasleen Kaur, Rinkle Rani, Nidhi Kalra:
Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS. 1047-1061 - Ridhima Rani, Neeraj Kumar, Meenu Khurana:
Redundancy elimination in IoT oriented big data: a survey, schemes, open challenges and future applications. 1063-1087 - Alper Ozcan, Ahmet Kasif, Ismail Veli Sezgin, Cagatay Catal, Muhammad Sanwal, Hasan Merdun:
Deep learning-based modelling of pyrolysis. 1089-1108 - Rong Gong, Delun Li, Lila Hong, Ningxin Xie:
Task scheduling in cloud computing environment based on enhanced marine predator algorithm. 1109-1123 - Lei Zeng, Shadi G. Alawneh, Seyed Ali Arefifar:
Parallel multi-GPU implementation of fast decoupled power flow solver with hybrid architecture. 1125-1136 - Huifang Li, Bing Chen, Jingwei Huang, Julio Ruben Cañizares Abreu, Senchun Chai, Yuanqing Xia:
Mutation-driven and population grouping PRO algorithm for scheduling budget-constrained workflows in the cloud. 1137-1158
Volume 27, Number 2, April 2024
- Nitin Singha, Mahesh K. Singh:
Maximizing utility by optimal capacity division in P2P networks. 1159-1168 - Limin Xia, Xiaoyue Ding:
Human-object interaction recognition based on interactivity detection and multi-feature fusion. 1169-1183 - Saeid Alirezazadeh, Luís A. Alexandre:
Ordered balancing: load balancing for redundant task scheduling in robotic network cloud systems. 1185-1200 - Kemal Akyol:
A comprehensive comparison study of traditional classifiers and deep neural networks for forest fire detection. 1201-1215 - Carlos Fernandez-Basso, M. Dolores Ruiz, María J. Martín-Bautista:
New Spark solutions for distributed frequent itemset and association rule mining algorithms. 1217-1234 - Ming Mao, Peng Yi, Lilong Hou, Wei Zhao:
A controller-based roadside unit plane architecture for software-defined internet of vehicles. 1235-1249 - Shahab Safaee, Meghdad Mirabi, Amir Masoud Rahmani, Ali Asghar Safaei:
A distributed B+Tree indexing method for processing range queries over streaming data. 1251-1274 - Maddila Suresh Kumar, Vadlamani Nagalakshmi:
Secure transfer of robust healthcare data using blockchain-based privacy. 1275-1291 - Raseena M. Haris, Khaled M. Khan, Armstrong Nhlabatsi, Mahmoud Barhamgi:
A machine learning-based optimization approach for pre-copy live virtual machine migration. 1293-1312 - Kimia Abedpour, Mirsaeid Hosseini Shirvani, Elmira Abedpour:
A genetic-based clustering algorithm for efficient resource allocating of IoT applications in layered fog heterogeneous platforms. 1313-1331 - Anisha Kumari, Bibhudatta Sahoo:
ACPM: adaptive container provisioning model to mitigate serverless cold-start. 1333-1360 - Gautam Srivastava, Jerry Chun-Wei Lin, Guo Lin:
Secure itemset hiding in smart city sensor data. 1361-1374 - Rongxin Chen, Guorong Cai, Jie Chen, Yuling Hong:
Integrated method for distributed processing of large XML data. 1375-1399 - Ming Li, Dechang Pi, Shuo Qin:
Knowledge-based multi-objective estimation of distribution algorithm for solving reliability constrained cloud workflow scheduling. 1401-1419 - Reyhane Ghafari, Najme Mansouri:
Improved Harris Hawks Optimizer with chaotic maps and opposition-based learning for task scheduling in cloud environment. 1421-1469 - Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil:
EIoT-DDoS: embedded classification approach for IoT traffic-based DDoS attacks. 1471-1490 - Haythem Bany Salameh, Mohammad Qasem Samara, Ghaleb A. Elrefae, Ahmad F. Al-Ajlouni:
Profit-maximization spectrum sharing in opportunistic duopoly market under dynamic spectrum pricing and QoS constraints. 1491-1502 - Seyedeh Shabnam Jazaeri, Sam Jabbehdari, Parvaneh Asghari, Hamid Haj Seyyed Javadi:
An efficient edge caching approach for SDN-based IoT environments utilizing the moth flame clustering algorithm. 1503-1525 - Jianing Zhao, Yubiao Pan, Huizhen Zhang, Mingwei Lin, Xin Luo, Zeshui Xu:
InPlaceKV: in-place update scheme for SSD-based KV storage systems under update-intensive Worklaods. 1527-1540 - Liyun Zuo, Jieguang He, Yonghui Xu, Lei Zhang:
CSADE: a delay-sensitive scheduling method based on task admission and delay evaluation on edge-cloud collaboration. 1541-1558 - Shivangi Shukla, Sankita J. Patel:
A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture. 1559-1580 - Shun Wang, Guosun Zeng:
Two-stage scheduling for a fluctuant big data stream on heterogeneous servers with multicores in a data center. 1581-1597 - Komal Pursharthi, Dheerendra Mishra:
A computationally efficient and randomized RLWE-based key exchange scheme. 1599-1610 - Guangyi Zhao, Simin Kou, Xuesong Yin, Guodao Zhang, Yigang Wang:
Self-supervised deep subspace clustering with entropy-norm. 1611-1623 - Ramesh Vatambeti, E. S. Phalguna Krishna, M. Ganesh Karthik, Vijay Kumar Damera:
Securing the medical data using enhanced privacy preserving based blockchain technology in Internet of Things. 1625-1637 - Yarasu Madhavi Latha, B. Srinivasa Rao:
Product recommendation using enhanced convolutional neural network for e-commerce platform. 1639-1653 - Shorouq Al-Eidi, Omar Darwish, Yuanzhu Chen, Majdi Maabreh, Yahya M. Tashtoush:
A deep learning approach for detecting covert timing channel attacks using sequential data. 1655-1665 - Hongjian Li, Jiaxin Liu, Lankai Yang, Liangjie Liu, Hu Sun:
An improved arithmetic optimization algorithm for task offloading in mobile edge computing. 1667-1682 - Mohammadreza Ipchi Sheshgelani, Saeid Pashazadeh, Pedram Salehpoor:
Framework for wrapping binary swarm optimizers to the hybrid parallel cooperative coevolving version. 1683-1697 - Nairita Sarkar, Pankaj Kumar Keserwani, Mahesh Chandra Govil:
A better and fast cloud intrusion detection system using improved squirrel search algorithm and modified deep belief network. 1699-1718 - Keerthi Kethineni, G. Pradeepini:
Intrusion detection in internet of things-based smart farming using hybrid deep learning framework. 1719-1732 - Selvam Durairaj, Rajeswari Sridhar:
MOM-VMP: multi-objective mayfly optimization algorithm for VM placement supported by principal component analysis (PCA) in cloud data center. 1733-1751 - Jiaxiang Zhang, Linwei Li, Huanlong Zhang, Feng-Xian Wang, Yangyang Tian:
A novel sparrow search algorithm with integrates spawning strategy. 1753-1773 - Masoud Nematollahi, Ali Ghaffari, Abbas Mirzaei:
Task and resource allocation in the internet of things based on an improved version of the moth-flame optimization algorithm. 1775-1797 - Dina A. Amer, Gamal Attiya, Ibrahim Ziedan:
An efficient multi-objective scheduling algorithm based on spider monkey and ant colony optimization in cloud computing. 1799-1819 - William S. Welling, Yanyan Sheng, Michelle M. Zhu:
CUDA-aware MPI implementation of Gibbs sampling for an IRT model. 1821-1830 - Jung-Woong Sung, Seung-Jae Han, Jin-Woo Kim:
Cloning-based virtual machine pre-provisioning for resource-constrained edge cloud server. 1831-1847 - Higinio Mora, Francisco A. Pujol, Tamai Ramírez, Antonio Jimeno-Morenilla, Julian Szymanski:
Network-assisted processing of advanced IoT applications: challenges and proof-of-concept application. 1849-1865 - Xizhen Deng, Mingcan Cen, M. Jiang, Meiqu Lu:
Ransomware early detection using deep reinforcement learning on portable executable header. 1867-1881 - Hao Xu, Chengfeng Jian:
A meta reinforcement learning-based virtual machine placement algorithm in mobile edge computing. 1883-1896 - Zhongguo Yang, Mingzhu Zhang, Han Li, Weilong Ding:
A novel seq2seq-based prediction approach for workflow scheduling. 1897-1910 - Ali Kelkawi, Imtiaz Ahmad, Mohammed El-Abd:
Spark-based cooperative coevolution for large scale global optimization. 1911-1926 - Sohaib Asif, Wenhui Yi, Qurrat Ul Ain, Yi Yueyang, Jinhai Si:
Improving the accuracy of diagnosing and predicting coronary heart disease using ensemble method and feature selection techniques. 1927-1946 - Gyan Singh, Amit K. Chaturvedi:
Hybrid modified particle swarm optimization with genetic algorithm (GA) based workflow scheduling in cloud-fog environment for multi-objective optimization. 1947-1964 - Slokashree Padhi, R. B. V. Subramanyam:
User request-based scheduling algorithms by managing uncertainty of renewable energy. 1965-1982 - Junfeng Tian, Ruxin Bai, Tianfeng Zhang:
Supporting dynamic update scheme for assured deletion based-multi-copy association tree. 1983-2001 - Lei Chen, Changzhou Feng, Yunpeng Ma:
Improved Harris Hawks optimization for global optimization and engineering design. 2003-2027 - Muhammad Akraam, Tabasam Rashid, Sohail Zafar:
A novel and secure image encryption scheme based on two-dimensional logistic and Arnold Cat map. 2029-2048 - Shaohua Wang, Xiaoxiong Xu:
A retrieval method of learners' behavior features based on K-means clustering algorithm. 2049-2058 - Han Yang, Jun Li:
Prototypical contrastive learning for image classification. 2059-2069 - Pablo C. Cañizares, Alberto Núñez, Rosa Filgueira, Juan de Lara:
Parallel mutation testing for large scale systems. 2071-2097 - Duan Chen, Zhengwei Huang, Yiting Tan, Jintao Min, Ribesh Khanal:
Emotion and sentiment analysis for intelligent customer service conversation using a multi-task ensemble framework. 2099-2115 - Ahmed Aleroud, Majd Shariah, Rami Malkawi, Samer Y. Khamaiseh, Abdullah S. Al-Alaj:
A privacy-enhanced human activity recognition using GAN & entropy ranking of microaggregated data. 2117-2132 - Donglin Zhu, Siwei Wang, Zuwei Huang, Changjun Zhou, Lin Zhang:
A JAYA algorithm based on normal clouds for DNA sequence optimization. 2133-2149 - Abid Jamal, Muhammad Umar Javed, Nabil Ali Alrajeh, Safdar Hussain Bouk, Nadeem Javaid:
Blockchain based reputation management, data storage and distributed revocation in vehicular energy networks in smart health care systems. 2151-2163 - Guang Yang, Lidong Han, Jingguo Bi, Fuqun Wang:
A collusion-resistant certificateless provable data possession scheme for shared data with user revocation. 2165-2179 - Sofia Strukova, José A. Ruipérez-Valiente, Félix Gómez Mármol:
Computational approaches to detect experts in distributed online communities: a case study on Reddit. 2181-2201 - Jingze Yu, Wenting Shen:
Secure cloud storage auditing with deduplication and efficient data transfer. 2203-2215 - Ahlem Abid, Farah Jemili, Ouajdi Korbaa:
Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques. 2217-2238 - Bhaskar Kapoor, Bharti Nagpal:
Hybrid cuckoo finch optimisation based machine learning classifier for seizure prediction using EEG signals in IoT network. 2239-2260 - Guangwei Xing, Yanrong Guo, Xiaoxuan Chen, Hangzai Luo, Sheng Zhong:
Improving UWB ranging accuracy via multiple network model with second order motion prediction. 2261-2272 - Tamara Dancheva, Unai Alonso, Michael Barton:
Cloud benchmarking and performance analysis of an HPC application in Amazon EC2. 2273-2290 - Mohammad Hossein Ghasemian Koochaksaraei, Abolfazl Toroghi Haghighat, Mohammad Hossein Rezvani:
An efficient cloud resource exchange model based on the double auction and evolutionary game theory. 2291-2307 - Safdar Jamil, Abdul Salam, Awais Khan, Bernd Burgstaller, Sung-Soon Park, Youngjae Kim:
Correction: Scalable NUMA-aware persistent B+-tree for non-volatile memory devices. 2309 - Retraction Note: Agricultural product monitoring system supported by cloud computing. 2311
Volume 27, Number 3, June 2024
- Yizhuo Yang, Hongjin Zeng, Tingping Chen, Meng Lv:
Design of a distributed offloading and real-time data unified access platform for IoT within command and control communication networks. 2313-2327 - ShiLong Zhao, Gang Li, Mingle Zhou, Min Li:
YOLO-CEA: a real-time industrial defect detection method based on contextual enhancement and attention. 2329-2344 - Mohit, Sanmeet Kaur, Maninder Singh:
Design and implementation of blockchain-based supply chain framework with improved traceability, privacy, and ownership. 2345-2363 - Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, Hung Tran:
Machine learning-based intrusion detection: feature selection versus feature extraction. 2365-2379 - Damon Alsup, Mohan Putluru, Suxia Cui, Yunpeng Zhang:
Cloud security game theory scoring from predation models in simulation. 2381-2398 - Olesia Pozdniakova, Aurimas Cholomskis, Dalius Mazeika:
Self-adaptive autoscaling algorithm for SLA-sensitive applications running on the Kubernetes clusters. 2399-2426 - Lamis Abdo, Imtiaz Ahmad, Sa'ed Abed:
A smart admission control and cache replacement approach in content delivery networks. 2427-2445 - Ali Siddique, Mang I Vai, Sio-Hang Pun:
A low-cost, high-throughput neuromorphic computer for online SNN learning. 2447-2464 - Bahman Varastan, Shahram Jamali, Reza Fotohi:
Hardening of the Internet of Things by using an intrusion detection system based on deep learning. 2465-2488 - Hani Al-Balasmeh, Maninder Singh, Raman Singh:
Hilbert curves-based location privacy technique for vehicular cloud networks. 2489-2504 - Chaira Mahmoud, Sofiane Aouag, Hadda Cherroun, Bouziane Brik, Abdelmounaam Rezgui:
A decentralized blockchain-based authentication scheme for cross-communication in IoT networks. 2505-2523 - Arslan Nedhir Malti, Mourad Hakem, Badr Benmammar:
A new hybrid multi-objective optimization algorithm for task scheduling in cloud systems. 2525-2548 - Jyothish A., Ashik Mathew, P. Vinod:
Effectiveness of machine learning based android malware detectors against adversarial attacks. 2549-2569 - Shuai Chang, Chunlin Li, Chunping Deng, Youlong Luo:
Low-latency controller load balancing strategy and offloading decision generation algorithm based on lyapunov optimization in SDN mobile edge computing environment. 2571-2591 - Deepika Kumari, Pankaj Kumar, Sunil Prajapat:
A blockchain assisted public auditing scheme for cloud-based digital twin healthcare services. 2593-2609 - Animesh Kuity, Sateesh Kumar Peddoju:
pHPCe: a hybrid power conservation approach for containerized HPC environment. 2611-2634 - Amer Al-Rahayfeh, Saleh Atiewi, Muder Almiani, Mohammad Jararweh, Miad Faezipour:
Utilizing 3D magnetic source imaging with landmark-based features and multi-classification for Alzheimer's Disease diagnosis. 2635-2651 - Shaoyong Li, Xueshu Hong, Yao Feng:
MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile. 2653-2671 - Amir Vafid Hanafi, Ali Ghaffari, Hesam Rezaei, Aida Valipour, Bahman Arasteh:
Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and LSTM. 2673-2690 - Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti, Reji Thomas, Tai-Hoon Kim:
RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things. 2691-2713 - Reyhaneh Ameri, Mohammad Reza Meybodi:
The cellular goore game-based consensus protocol: a cognitive model for blockchain consensus. 2715-2740 - Bing Tang, Huiyuan Han, Qing Yang, Wei Xu:
Operator placement for data stream processing based on publisher/subscriber in hybrid cloud-fog-edge infrastructure. 2741-2759 - Yihong Liu, Xuchang Liu, Bo Zhang:
RetinaNet-vline: a flexible small target detection algorithm for efficient aggregation of information. 2761-2773 - Xiao Zhang:
Mixtran: an efficient and fair scheduler for mixed deep learning workloads in heterogeneous GPU environments. 2775-2784 - Hemant B. Mahajan, K. T. V. Reddy:
Secure gene profile data processing using lightweight cryptography and blockchain. 2785-2803 - Ankita Srivastava, Narander Kumar:
An efficient firefly and honeybee based load balancing mechanism in cloud infrastructure. 2805-2827 - Biroju Papachary, Rajeev Arya, Bhasker Dappuri:
Efficient resource allocation with dynamic traffic arrivals on D2D communication for beyond 5G networks. 2829-2843 - Hajer Nabli, Raoudha Ben Djemaa, Ikram Amous Ben Amor:
Improved clustering-based hybrid recommendation system to offer personalized cloud services. 2845-2874 - Hajer Nabli, Raoudha Ben Djemaa, Ikram Amous Ben Amor:
Correction: Improved clustering-based hybrid recommendation system to offer personalized cloud services. 2875 - Kariyappa Janani, Sriramulu Ramamoorthy:
A security framework to enhance IoT device identity and data access through blockchain consensus model. 2877-2900 - Zhanyou Ma, Miao Yan, Rong Wang, Shunzhi Wang:
Performance analysis of P2p network content delivery based on queueing model. 2901-2915 - Thanasis Moustakas, Kostas Kolomvatsos:
Cluster based similarity extraction upon distributed datasets. 2917-2929 - Yi Wan:
The balance of utility, privacy, and trust in network services. 2931-2946 - M. Gayathri Santhosh, T. R. Reshmi:
A novel revocation management for distributed environment: a detailed study. 2947-2958 - Gongbo Liang, Mohammad Salem Atoum, Xin Xing, Izzat Alsmadi:
Benchmark assessment for the DeepSpeed acceleration library on image classification. 2959-2970 - Abdelaziz Mokhnache, Lahcene Ziet, Fayçal Radjah:
Comparative analysis between a pixel-wise image encryption scheme and AES in a web application context. 2971-2982 - K. T. Jafseer, S. Shailesh, A. Sreekumar:
CPOCEDS-concept preserving online clustering for evolving data streams. 2983-2998 - D. Balakrishnan, T. Dhiliphan Rajkumar, S. Dhanasekaran, B. S. Murugan:
Secure and energy-efficient data transmission framework for IoT-based healthcare applications using EMCQLR and EKECC. 2999-3016 - Ning Xie, Jixian Zhang, Xuejie Zhang, Weidong Li:
Double auction mechanisms in edge computing resource allocation for blockchain networks. 3017-3035 - Dexin Zhu, Yu Sun, Nianfeng Li, Lijun Song, Jun Zheng:
Secure electronic medical records sharing scheme based on blockchain and quantum key. 3037-3054 - Rami Al-Jarrah, Hitham Tlilan, Abdallah Khreishah:
Exploiting the adaptive neural fuzzy inference system for predicting the effect of notch depth on elastic new strain-concentration factor under combined loading. 3055-3073 - Xiaolong Chen, Du Yu:
Hybrid artificial immune algorithm for energy-efficient distributed flexible job shop in semiconductor manufacturing. 3075-3098 - Ahmet Vedat Tokmak, Akhan Akbulut, Cagatay Catal:
Boosting the visibility of services in microservice architecture. 3099-3111 - Qihuan Wu, Xiaoming You, Sheng Liu:
Multi-ant colony optimization algorithm based on game strategy and hierarchical temporal memory model. 3113-3133 - Prabhjot Kaur, Nitin Kumar:
BRIEFBCS: binary robust independent elementary features based fuzzy vault scheme in BCS. 3135-3148 - Yuchen Zhang, Xiao Zhang, Jinyang Yu, Yulong Shi, Linxuan Su:
Quantification and analysis of performance fluctuation in distributed file system. 3149-3162 - Mahmoud Darwich, Taghreed Alghamdi, Kasem Khalil, Yasser Ismail, Magdy A. Bayoumi:
Cost-optimized cloud resource management for video streaming: ARIMA predictive approach. 3163-3177 - Neha Gahlan, Divyashikha Sethia:
Federated learning inspired privacy sensitive emotion recognition based on multi-modal physiological sensors. 3179-3201 - Attia Qammar, Abdenacer Naouri, Jianguo Ding, Huansheng Ning:
Blockchain-based optimized edge node selection and privacy preserved framework for federated learning. 3203-3218 - Ju-Won Park, Xin Huang, Jae-Kook Lee, Taeyoung Hong:
I/O-signature-based feature analysis and classification of high-performance computing applications. 3219-3231 - Jeong-Hoon Kim, Sun-Hyun Kim, Charn-Doh Bak, Seung-Jae Han:
Adaptive cloud resource allocation for large-scale crowdsourced multimedia live streaming services. 3233-3257 - Abdullah Alsalemi, Abbes Amira, Hossein Malekmohamadi, Kegong Diao:
Energy data classification at the edge: a comparative studyfor energy efficiency applications. 3259-3275 - Liyan Xiong, Zhuyi Hu, Xinhua Yuan, Weihua Ding, Xiaohui Huang, Yuanchun Lan:
Multi-scale attention graph convolutional recurrent network for traffic forecasting. 3277-3291 - Yuping Yan, Yutian Hong:
Design of the implementation information management platform for distributed generation in distribution network based on information integration. 3293-3305 - Rami Mohawesh, Muna Al-Hawawreh, Sumbal Maqsood, Omar AlQudah:
Factitious or fact? Learning textual representations for fake online review detection. 3307-3322 - Hui Xiang, Meiyu Zhang, Chengfeng Jian:
Federated deep reinforcement learning-based online task offloading and resource allocation in harsh mobile edge computing environment. 3323-3339 - Zeynep Garip, Ekin Ekinci, Murat Erhan Çimen:
A comparative study of optimization algorithms for feature selection on ML-based classification of agricultural data. 3341-3362 - Sana Aurangzeb, Muhammad Aleem, Muhammad Taimoor Khan, Haris Anwar, Muhammad Shaoor Siddique:
Cybersecurity for autonomous vehicles against malware attacks in smart-cities. 3363-3378 - Olfa Souki, Raoudha Ben Djemaa, Ikram Amous, Florence Sèdes:
Monitoring and analyzing as a service (MAaaS) through cloud edge based on intelligent transportation applications. 3379-3395 - Ruiwen Wang, Jihong Liu, Qiang Zhang, Chao Fu, Yongzhu Hou:
Federated learning for feature-fusion based requirement classification. 3397-3416 - Shruti Arora, Rinkle Rani, Nitin Saxena:
SETL: a transfer learning based dynamic ensemble classifier for concept drift detection in streaming data. 3417-3432 - Alberto Cabrera, Francisco Almeida, Dagoberto Castellanos Nieves, Ariel Oleksiak, Vicente Blanco Pérez:
Energy efficient power cap configurations through Pareto front analysis and machine learning categorization. 3433-3449 - Eduru Harindra Venkatesh, Yelleti Vivek, Vadlamani Ravi, Shiva Shankar Orsu:
Parallel and streaming wavelet neural networks for classification and regression under apache spark. 3451-3469 - Anirudh Kasturi, Akshat Agrawal, Chittaranjan Hota:
Secure peer-to-peer learning using feature embeddings. 3471-3479 - Tao Shen, Qianqi Sun, Chi Zhang, Fenhua Bai:
SEKad: a scalable protocol for blockchain networks with enhanced broadcast efficiency. 3481-3498 - Guilherme Andrade, Willian Barreiros, Leonardo Rocha, Renato Ferreira, George Teodoro:
Large-scale response-aware online ANN search in dynamic datasets. 3499-3519 - Sara Amaouche, Azidine Guezzaz, Said Benkirane, Mourade Azrour:
IDS-XGbFS: a smart intrusion detection system using XGboostwith recent feature selection for VANET safety. 3521-3535 - Avtar Singh, Harpreet Kaur, Navjot Kaur:
A novel DDoS detection and mitigation technique using hybrid machine learning model and redirect illegitimate traffic in SDN network. 3537-3557 - Guoao Zhou, Lijuan Yu, Yixin Su, Bingrong Xu, Guoyuan Zhou:
Lightweight PCB defect detection algorithm based on MSD-YOLO. 3559-3573 - Lin Zhang, Lizhen Ji, Zongfang Ma:
Target positioning method based on B-spline level set and GC Yolo-v3. 3575-3591 - Anusha Nalajala, Thirumalaisamy Ragunathan, Ranesh Naha, Sudheer Kumar Battula:
Application and user-specific data prefetching and parallel read algorithms for distributed file systems. 3593-3613 - Nasraldeen Alnor Adam Khleel, Károly Nehéz:
Software defect prediction using a bidirectional LSTM network combined with oversampling techniques. 3615-3638 - Alireza Souri, Monire Norouzi, Yousef Alsenani:
A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things. 3639-3655 - Vidyapati Jha, Priyanka Tripathi:
Decentralized knowledge discovery using massive heterogenous data in Cognitive IoT. 3657-3682 - Mohd Akbar, Irshad Ahmad, Mohsina Mirza, Manavver Ali, Praveen Barmavatu:
Enhanced authentication for de-duplication of big data on cloud storage system using machine learning approach. 3683-3702 - Dong Yang, Ruyan Ren:
A method of system selection for shuttle-based storage and retrieval system considering cost and performance. 3703-3716 - Hussam N. Fakhouri, Sadi Alawadi, Feras M. Awaysheh, Faten Hamad:
Novel hybrid success history intelligent optimizer with Gaussian transformation: application in CNN hyperparameter tuning. 3717-3739 - Sherif Hamdy Gomaa Salem, Ashraf Yehia Hassan, Marwa S. Moustafa, Mohamed Nabil Hassan:
Blockchain-based biometric identity management. 3741-3752 - Ashish R. Chaudhari, Bhavesh N. Gohil, Udai Pratap Rao:
A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis. 3753-3769 - Farah Jemili, Rahma Meddeb, Ouajdi Korbaa:
Intrusion detection based on ensemble learning for big data classification. 3771-3798 - Mohammad Ali Alizadeh, Somayyeh Jafarali Jassbi, Ahmad Khademzadeh, Majid Haghparast:
Novel lightweight and fine-grained fast access control using RNS properties in fog computing. 3799-3817 - Somnath Chatterjee, Vaibhav Shaw, Ranit Das:
Multi-stage intrusion detection system aided by grey wolf optimization algorithm. 3819-3836 - Faquan Chen, Miaolei Deng, Hui Gao, Xiaoya Yang, Dexian Zhang:
AP-Net: a metallic surface defect detection approach with lightweight adaptive attention and enhanced feature pyramid. 3837-3851 - Kheireddine Zaghouani, Badis Djamaa, Ali Yachir:
DRDChain: a blockchain-based distributed resource directory for the internet of things. 3853-3874 - Chanyoung Oh, Saehanseul Yi, Jongkyu Seok, Hyeonjin Jung, Illo Yoon, Youngmin Yi:
Hybridhadoop: CPU-GPU hybrid scheduling in hadoop. 3875-3892 - Zhengtao Jiang, Kai Li, Yong Wang, Meilin Liu, Huiqiang Li:
A task allocation schema based on response time optimization in cloud computing. 3893-3910
Volume 27, Number 4, July 2024
- Brandon A. Mosqueda González, Omar Hasan, Wisnu Uriawan, Youakim Badr, Lionel Brunie:
Secure and efficient decentralized machine learning through group-based model aggregation. 3911-3925 - Jongho Seol, Zuqiang Ke, Abhilash Kancharla, Shital Joshi, Nohpill Park:
A non-fungible token (NFT) chain model and performance study. 3927-3944 - Shengwei You, Kristina Radivojevic, Jarek Nabrzyski, Paul R. Brenner:
Persona preserving reputation protocol (P2RP) for enhanced security, privacy, and trust in blockchain oracles. 3945-3956 - Wenxiang Wei, Nafei Zhu, Jian Wang, Hongyu Song, Jingsha He:
A scalable blockchain storage scheme for VANET. 3957-3981 - Si Yuan Jin, Yong Xia, Bo Tong Xu:
Scalability meets regulation: UTXO-based sharding and zero-knowledge proofs for regulated digital currencies. 3983-3996 - Youssif Abuzied, Mohamed Ghanem, Fadi Dawoud, Habiba Gamal, Eslam Soliman, Hossam Sharara, Tamer A. ElBatt:
A privacy-preserving federated learning framework for blockchain networks. 3997-4014 - Md. Jobair Hossain Faruk, Fazlul Alam, Mazharul Islam, Akond Rahman:
Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparency. 4015-4034 - Sebastian Kotstein, Christian Decker:
RESTBERTa: a Transformer-based question answering approach for semantic search in Web API documentation. 4035-4061 - Aditi Gupta, Sukanya Gupta, Adeiza James Onumanyi, Satyadev Ahlawat, Yamuna Prasad, Virendra Singh:
A-TSPD: autonomous-two stage algorithm for robust peak detection in online time series. 4063-4076 - Robin Lichtenthäler, Guido Wirtz:
Formulating a quality model for cloud-native software architectures: conceptual and methodological considerations. 4077-4093 - Yashwant Singh Patel, Paul Townend, Anil Singh, Per-Olov Östberg:
Modeling the Green Cloud Continuum: integrating energy considerations into Cloud-Edge models. 4095-4125 - Nithya Chidambaram, Karuppusamy Thenmozhi, Pethuru Raj, Rengarajan Amirtharajan:
DNA-chaos governed cryptosystem for cloud-based medical image repository. 4127-4144 - Tomás Cerný, Amr S. Abdelfattah, Jorge Yero, Davide Taibi:
From static code analysis to visual models of microservice architecture. 4145-4170 - Md Showkat Hossain Chy, Korn Sooksatra, Jorge Yero, Tomás Cerný:
Benchmarking Micro2Micro transformation: an approach with GNN and VAE. 4171-4185 - Ako Muhammad Abdullah:
Energy-efficient aware and predicting bandwidth estimation routing protocol for hybrid communication in wireless body area networks. 4187-4206 - Rekha, Ritu Garg:
K-LionER: meta-heuristic approach for energy efficient cluster based routing for WSN-assisted IoT networks. 4207-4221 - Tarik Zakaria Benmerar, Theodoros Theodoropoulos, Diogo Fevereiro, Luís Rosa, João Rodrigues, Tarik Taleb, Paolo Barone, Giovanni Giuliani, Konstantinos Tserpes, Luís Cordeiro:
Towards establishing intelligent multi-domain edge orchestration for highly distributed immersive services: a virtual touring use case. 4223-4253 - Thiago Pereira da Silva, Thaís Vasconcelos Batista, Flávia Coimbra Delicato, Paulo de Figueiredo Pires:
An online ensemble method for auto-scaling NFV-based applications in the edge. 4255-4279 - Zari Shamsa, Ali Rezaee, Sahar Adabi, Ali Movaghar-Rahimabadi, Amir Masoud Rahmani:
A distributed load balancing method for IoT/Fog/Cloud environments with volatile resource support. 4281-4320 - Durgabati Podder, Subhrajyoti Deb, Debapriya Banik, Nirmalya Kar, Aditya Kumar Sahu:
Robust medical and color image cryptosystem using array index and chaotic S-box. 4321-4346 - Hesham AlMansouri, Zaid Hussain:
Shortest node-to-node disjoint paths algorithm for symmetric networks. 4347-4360 - Lisheng Sun, Yongjie Ma, Yuhua Pan, Minghao Wang:
Refining differential evolution with mutation rate and neighborhood weight local search. 4361-4384 - Komeil Moghaddasi, Mohammad Masdari:
Blockchain-driven optimization of IoT in mobile edge computing environment with deep reinforcement learning and multi-criteria decision-making techniques. 4385-4413 - Liang Zeng, Junyang Shi, Ming Li, Shanshan Wang:
Sine Cosine Embedded Squirrel Search Algorithm for Global Optimization and Engineering Design. 4415-4448 - Ali Seyfollahi, Md Mainuddin, Tania Taami, Ali Ghaffari:
RM-RPL: reliable mobility management framework for RPL-based IoT systems. 4449-4468 - M. I. Thariq Hussan, G. Vinoda Reddy, P. T. Anitha, A. Kanagaraj, P. Naresh:
DDoS attack detection in IoT environment using optimized Elman recurrent neural networks based on chaotic bacterial colony optimization. 4469-4490 - Javad Dogani, Ali Yazdanpanah, Arash Zare, Farshad Khunjush:
A two-tier multi-objective service placement in container-based fog-cloud computing platforms. 4491-4514 - Mohammad Hadian, Seyed Hossein Erfani, Mahmood Deypir, Meghdad Mirabi:
CD-TMS: a combinatorial design-based token management system to enhance security and performance in blockchain. 4515-4536 - Marzieh Sadat Zahedinia, Mohammad Reza Khayyambashi, Ali Bohlooli:
IoT data management for caching performance improvement in NDN. 4537-4550 - Saleh Atiewi, Amer Al-Rahayfeh, Muder Almiani, Abdullah Abuhussein, Salman Yussof:
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks. 4551-4568 - Birglang Bargayary, Nabajyoti Medhi:
Preserving flow table integrity in OpenFlow networks through smart contract. 4569-4588 - Nidhi Kumari, Prasanta K. Jana:
A metaheuristic-based task offloading scheme with a trade-off between delay and resource utilization in IoT platform. 4589-4603 - Zhengfeng Li, Changchun Zhao, Guohui Zhang, Donglin Zhu, Lujun Cui:
Multi-strategy improved sparrow search algorithm for job shop scheduling problem. 4605-4619 - Mohammed Maray, Sahibzada Muhammad Rizwan, Ehzaz Mustafa, Junaid Shuja:
Microservices enabled bidirectional fault-tolerance scheme for healthcare internet of things. 4621-4633 - Husni Abed, Omar Al-Zoubi, Hashem Alayan, Mohammad Alshboul:
Towards maintaining confidentiality and anonymity in secure blockchain-based e-voting. 4635-4657 - Sahul Goyal, Lalit Kumar Awasthi:
An energy-efficient black widow-based adaptive VM placement approach for cloud computing. 4659-4672 - Smruti Rekha Swain, Anshu Parashar, Ashutosh Kumar Singh, Chung-Nan Lee:
Efficient straggler task management in cloud environment using stochastic gradient descent with momentum learning-driven neural networks. 4673-4685 - José Manuel Ruiz Ródenas, Javier Pastor-Galindo, Félix Gómez Mármol:
A general and modular framework for dark web analysis. 4687-4703 - Laya Mohammadi, Vahid Khajehvand:
Energy consumption optimization through an intelligent task offloading prediction mechanism in vehicular fog networks. 4705-4723 - Partha Sarathi Chakraborty, Omkar Santosh Gavhane, Somanath Tripathy:
SEVCOD: secure and efficient verifiable computation on outsourced data. 4725-4739 - Xiaoyan Zhao, Conghui Zhang, Shaopeng Guan:
A data lake-based security transmission and storage scheme for streaming big data. 4741-4755 - Changyu Duan, Rong Jiang, Yi Zhang, Bin Wu, Fengliang Li, Yu Duan:
Distributed medical data storage model based on blockchain technology. 4757-4777 - Mustafa Daraghmeh, Anjali Agarwal, Yaser Jararweh:
An ensemble clustering approach for modeling hidden categorization perspectives for cloud workloads. 4779-4803 - Jiechao Liang, Weiwei Lin, Yangguang Xu, Yubin Liu, Ruichao Mo, Xiaoxuan Luo:
Energy-aware parameter tuning for mixed workloads in cloud server. 4805-4821 - Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti:
Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities. 4823-4839 - Yuchen Zhang, Xiao Zhang, Yulong Shi, Zhijie Huang:
Sg: Automated tuning algorithm for storage systems based on simulated environments and group climbing. 4841-4853 - Jie Luo, Zhengshuai Yin, Linqiu Gui:
A GNSS UWB tight coupling and IMU ESKF algorithm for indoor and outdoor mixed scenario. 4855-4865 - Uddeshaya Kumar, Manish Garg, Gautam Kaushik:
Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication. 4867-4881 - Taha Abdelazziz Rahmani, Ghalem Belalem, Sidi Ahmed Mahmoudi, Omar Rafik Merad Boudia:
Machine learning-driven energy-efficient load balancing for real-time heterogeneous systems. 4883-4908 - Mohammad Osmanpoor, Alireza Shameli-Sendi, Fateme Faraji Daneshgar:
Convergence of the Harris hawks optimization algorithm and fuzzy system for cloud-based task scheduling enhancement. 4909-4923 - Sanjay Roka, Manoj Diwakar:
DSLSTM: a deep convolutional encoder-decoder architecture for abnormality detection in video surveillance. 4925-4940 - Walid K. Ghamry, Suzan Shukry:
Multi-objective intelligent clustering routing schema for internet of things enabled wireless sensor networks using deep reinforcement learning. 4941-4961 - Gurjot Singh, Prajit Sengupta, Anant Mehta, Jatin Bedi:
A feature extraction and time warping based neural expansion architecture for cloud resource usage forecasting. 4963-4982 - Zeyneb Chafai, Hassina Nacer, Ouiza Lekadir, Nawel Gharbi, Linda Ouchaou:
A performance evaluation model for users' satisfaction in federated clouds. 4983-5004 - D. Adhimuga Sivasakthi, A. Sathiyaraj, Ramkumar Devendiran:
HybridRobustNet: enhancing detection of hybrid attacks in IoT networks through advanced learning approach. 5005-5019 - Bo Zhang, Yanyan Xu, Yuejing Yan, Zhiheng Wang:
Privacy-preserving image retrieval based on additive secret sharing in cloud environment. 5021-5045 - Bilal Abu-Salih, Salihah Alotaibi, Ruba Abukhurma, Muder Almiani, Mohammed Aljaafari:
DAO-LGBM: dual annealing optimization with light gradient boosting machine for advocates prediction in online customer engagement. 5047-5073 - Nidhi, Jyoti Grover:
Federated learning analysis for vehicular traffic flow prediction: evaluation of learning algorithms and aggregation approaches. 5075-5091 - Jung-Woong Sung, Seung-Jae Han:
Use of edge resources for DNN model maintenance in 5G IoT networks. 5093-5105 - Yassin Farhat, Asma Atig, Ali Zribi, Ridha Ben Abdennour:
Neural emulator for nonlinear systems based on PSO algorithm: real-time validation. 5107-5119 - Mohammad Mohammadi, Amin Mehranzadeh, Mohsen Chekin:
F-EVM: improving routing in Internet of Things using fuzzy MAIRCA approach and fuzzy eigenvector method. 5121-5141 - Mehrin Rouhifar, Alireza Hedayati, Vahe Aghazarian:
DITRA: an efficient event-driven multi-objective optimization algorithm for bandwidth allocation in IoT environments. 5143-5163 - Mehdi Seydali, Farshad Khunjush, Javad Dogani:
Streaming traffic classification: a hybrid deep learning and big data approach. 5165-5193 - Numan Shafi, Muhammad Abdullah, Waheed Iqbal, Abdelkarim Erradi, Faisal Bukhari:
Cdascaler: a cost-effective dynamic autoscaling approach for containerized microservices. 5195-5215 - Vijaita Kashyap, Rakesh Ahuja, Ashok Kumar:
A hybrid approach for fault-tolerance aware load balancing in fog computing. 5217-5233 - Benyamin Abdollahzadeh, Nima Khodadadi, Saeid Barshandeh, Pavel Trojovský, Farhad Soleimanian Gharehchopogh, El-Sayed M. El-Kenawy, Laith Abualigah, Seyedali Mirjalili:
Puma optimizer (PO): a novel metaheuristic optimization algorithm and its application in machine learning. 5235-5283 - Masoum Farahmandian, Mehdi Farrokhbakht Foumani, Peyman Bayat:
Improving fault tolerance in LinuX container-based distributed systems using blockchain. 5285-5294 - Anurag Choubey, Abhishek Sikarwar, Shreya Asoba, Rajiv Misra:
Towards an IPFS-based highly scalable blockchain for PEV charging and achieve near super-stability in a V2V environment. 5295-5336 - Slokashree Padhi, R. B. V. Subramanyam:
Uncertainty Level-Based Algorithms by Managing Renewable Energy for Geo-Distributed Datacenters. 5337-5354 - Muhammad Hussain, Nadeem Iqbal, Zia Bashir:
Image pixels swapping encryption based on the TetraVex game and a publicly hash-sharing algorithm. 5355-5376 - Havva Gülay Gürbüz, Bedir Tekinerdogan, Cagatay Catal, Nagehan Pala Er:
Test suite assessment of safety-critical systems using safety tactics and fault-based mutation testing. 5377-5401 - Akashdeep Kaur, Sharad Saxena, Rajesh Kumar:
OsCoMIT: Osmotic computing-based service management for intelligent transportation systems in 5G network. 5403-5421 - Jiawen Deng, Jihui Zhang, Shengxiang Yang:
Optimizing electric vehicle routing with nonlinear charging and time windows using improved differential evolution algorithm. 5423-5458 - Manikandan Nanjappan, Pradeep Krishnadoss, Gobalakrishnan Natesan, A. Samydurai, G. Premalatha:
DeepLG SecNet: utilizing deep LSTM and GRU with secure network for enhanced intrusion detection in IoT environments. 5459-5471 - Helen D. Karatza, Georgios L. Stavrinides:
Resource allocation and aging priority-based scheduling of linear workflow applications with transient failures and selective imprecise computations. 5473-5488
Volume 27, Number 5, August 2024
- Zahra Shojaee Rad, Mostafa Ghobaei-Arani, Reza Ahsan:
Memory orchestration mechanisms in serverless computing: a taxonomy, review and future directions. 5489-5515 - Ajay Nain, Sophiya Sheikh, Mohammad Shahid, Rohit Malik:
Resource optimization in edge and SDN-based edge computing: a comprehensive study. 5517-5545 - Iqra Sadia Rao, Miss Laiha Mat Kiah, M. Muzaffar Hameed, Zain Anwer Memon:
Scalability of blockchain: a comprehensive review and future research direction. 5547-5570 - Mohsen Ghorbian, Mostafa Ghobaei-Arani, Leila Esmaeili:
A survey on the scheduling mechanisms in serverless computing: a taxonomy, challenges, and trends. 5571-5610 - Ankush Manocha, Sandeep Kumar Sood, Munish Bhatia:
Edge intelligence-assisted smart healthcare solution for health pandemic: a federated environment approach. 5611-5630 - Hammadi Bennoui, Soumia Mancer:
CBPNs: coloured behavioural petri nets for model-based diagnosis. 5631-5646 - Marzieh Ranjbar Pirbasti, Olivia Das:
Ovcosim: an open-source versatile computation offloading simulator for cloud and fog computing. 5647-5661 - Jing Song, Jinyong Chang:
General construction of compressive integrity auditing protocol from strong homomorphic encryption scheme. 5663-5675 - Nafei Zhu, Yue Yang, Weidong Du, Yu Gan, Jingsha He:
Toward designing highly effective and efficient consensus mechanisms for blockchain-based applications. 5677-5698 - Sheetal Garg, Rohit Ahuja, Raman Singh, Ivan Perl:
An effective deep learning architecture leveraging BIRCH clustering for resource usage prediction of heterogeneous machines in cloud data center. 5699-5719 - Vaibhav Tiwari, Chandrasen Pandey, Diptendu Sinha Roy:
A forecasting-based approach for optimal deployment of edge servers in 5G networks. 5721-5739 - Rachid EL Mokadem, Yann Ben Maissa, Zineb El Akkaoui:
eXtreme Federated Learning (XFL): a layer-wise approach. 5741-5754 - Gunaganti Sravanthi, Nageswara Rao Moparthi:
An efficient IoT based crop disease prediction and crop recommendation for precision agriculture. 5755-5782 - Ardalan Ghasemzadeh, Hadi S. Aghdasi, Saeed Saeedvand:
Edge server placement and allocation optimization: a tradeoff for enhanced performance. 5783-5797 - Jamil Al-Sawwa, Mohammad Almseidin, Mouhammd Alkasassbeh, Khalid Alemerien, Remah Younisse:
Spark-based multi-verse optimizer as wrapper features selection algorithm for phishing attack challenge. 5799-5814 - Hamid Hadian, Mohsen Sharifi:
GT-scheduler: a hybrid graph-partitioning and tabu-search based task scheduler for distributed data stream processing systems. 5815-5832 - Songrun Yang, Jinyong Chang:
Identity-based remote data integrity auditing from lattices for secure cloud storage. 5833-5844 - Ameni Hedhli, Haithem Mezni, Lamjed Ben Said:
BPaaS placement over optimum cloud availability zones. 5845-5865 - Lhoussaine Daoudi, Mohamed Baslam, Mohamed Zagour, Said Safi:
5 G and beyond wireless network optimization through RIS technology: a pricing game. 5867-5877 - Binghui Qie, Xun Weng, Zhiwei Sun, Minyu Jin, Runfeng Yu:
Location-routing and cost-sharing models under joint distribution. 5879-5891 - Mohsen Khani, Shahram Jamali, Mohammad Karim Sohrabi:
Three-layer data center-based intelligent slice admission control algorithm for C-RAN using approximate reinforcement learning. 5893-5911 - NarasimhaSwamy Biyyapu, Esther Jyothi Veerapaneni, Surapaneni Phani Praveen, Sai Srinivas Vellela, Ramesh Vatambeti:
Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection. 5913-5931 - Ningkang Pan, Li Lv, Renbin Xiao, Hui Wang, Zhihua Cui:
A large-scale multi-objective firefly algorithm based on reward and punishment mechanisms and adaptive dimensional reorganization. 5933-5951 - Shahnawaz Ahmad, Shabana Mehfuz, Shabana Urooj, Najah Alsubaie:
Machine learning-based intelligent security framework for secure cloud key management. 5953-5979 - Jiadong Dong, Lin Chen, Chunxiang Zheng, Kai Pan, Qinghu Guo, Shunfeng Wu, Zhaoxiang Wang:
A hierarchical optimization approach for industrial task offloading and resource allocation in edge computing systems. 5981-5993 - Nilesh J. Uke, Sharayu A. Lokhande, Preeti Kale, Shilpa Devram Pawar, Aparna A. Junnarkar, Sulbha Yadav, Swapna Bhavsar, Hemant B. Mahajan:
Distributed privacy preservation for online social network using flexible clustering and whale optimization algorithm. 5995-6012 - Sujoy Roy, Jeet Agrawal, Alok Kumar, Udai Pratap Rao:
Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing. 6013-6038 - Ruchika Malhotra, Anjali Bansal, Marouane Kessentini:
Deployment and performance monitoring of docker based federated learning framework for software defect prediction. 6039-6057 - Francisco Airton Silva, Iure Fé, Francisco Silva, Tuan Anh Nguyen:
Quantifying the impact of resource redundancy on smart city system dependability: a model-driven approach. 6059-6079 - Juan M. Orduña, Carlos Pérez:
Using a nested virtualization tool for teaching VPN fundamentals. 6081-6095 - Abdellah Amzil, Mohamed Abid, Mohamed Hanini, Abdellah Zaaloul, Said El Kafhali:
Stochastic analysis of fog computing and machine learning for scalable low-latency healthcare monitoring. 6097-6117 - Qinlu He, Fan Zhang, Genqing Bian, Weiqi Zhang, Zhen Li:
Design and realization of hybrid resource management system for heterogeneous cluster. 6119-6144 - Ammar Kamal Abasi, Moayad Aloqaily, Mohsen Guizani:
Bare-bones based honey badger algorithm of CNN for Sleep Apnea detection. 6145-6165 - Kishu Gupta, Deepika Saxena, Rishabh Gupta, Ashutosh Kumar Singh:
MAIDS: malicious agent identification-based data security model for cloud environments. 6167-6184 - Minzhi Xu, Weidong Li, Xuejie Zhang, Qian Su:
A discrete dwarf mongoose optimization algorithm to solve task assignment problems on smart farms. 6185-6204 - Vijay Kumar Yadav, Pushpa, Khushi Dabas, Shobhita Khatri, Vanshika Sehrawat:
Circulation of legitimate information over VANETs using threshold signature scheme. 6205-6221 - Paluck Arora, Rajesh Mehta, Rohit Ahuja:
An integration of meta-heuristic approach utilizing kernel principal component analysis for multimodal medical image registration. 6223-6246 - Bing Tang, Yuqiang Xiao, Li Zhang, Buqing Cao, Mingdong Tang, Qing Yang:
AFL-HCS: asynchronous federated learning based on heterogeneous edge client selection. 6247-6264 - Ramandeep Sandhu, Mohammad Faiz, Harpreet Kaur, Ashish Srivastava, Vipul Narayan:
Enhancement in performance of cloud computing task scheduling using optimization strategies. 6265-6288 - Nabila Azeri, Ouided Hioual, Ouassila Hioual:
A distributed intelligence framework for enhancing resilience and data privacy in dynamic cyber-physical systems. 6289-6304 - Renu Sharma, Anil Sharma:
Iot interoperability framework for smart home: MDA-inspired approach. 6305-6322 - Kyle Klenk, Raymond J. Spiteri:
Improving resource utilization and fault tolerance in large simulations via actors. 6323-6340 - Haotian Luo, Niansong Mei, Chong Du:
EMR sharing system with lightweight searchable encryption and rights management. 6341-6353 - Mahmoud Darwich, Magdy A. Bayoumi:
Video quality adaptation using CNN and RNN models for cost-effective and scalable video streaming Services. 6355-6375 - Anil Kumar Yamarthy, Ch. Koteswara Rao:
MDepthNet based phishing attack detection using integrated deep learning methodologies for cyber security enhancement. 6377-6395 - Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil:
SDDA-IoT: storm-based distributed detection approach for IoT network traffic-based DDoS attacks. 6397-6424 - Chang Zhang, Tao Zhu, Hangxing Wu, Huansheng Ning:
PerMl-Fed: enabling personalized multi-level federated learning within heterogenous IoT environments for activity recognition. 6425-6440 - Mengjian Zhang, Guihua Wen:
Duck swarm algorithm: theory, numerical optimization, and applications. 6441-6469 - Behzad Saemi, Fatemeh Halataei, Rouhollah Ahmadi, Ali A. R. Hosseinabadi, Seyed Saeid Mirkamali, Ali Asghar Rahmani Hosseinabadi:
Improving the quality of real-time data transmission service in VANETS by balancing the load on road side units. 6471-6487 - Behzad Saemi, Fatemeh Halataei, Rouhollah Ahmadi, Ali A. R. Hosseinabadi, Seyed Saeid Mirkamali, Ali Asghar Rahmani Hosseinabadi:
Correction: Improving the quality of real-time data transmission service in VANETS by balancing the load on road side units. 6489 - Nenavath Chander, Mummadi Upendra Kumar:
Enhanced pelican optimization algorithm with ensemble-based anomaly detection in industrial internet of things environment. 6491-6509 - Qianye Ren, Bin Zhuge, Zitian Zhang, Ligang Dong, Xian Jiang:
Improved sparrow algorithm based virtual machine placement. 6511-6525 - Saroj Kumar Sahoo, Apu Kumar Saha, Essam H. Houssein, M. Premkumar, Salpa Reang, Marwa M. Emam:
An arithmetic and geometric mean-based multi-objective moth-flame optimization algorithm. 6527-6561 - Gaofeng Zhang, Xiang Li, Liqiang Xu, Ensheng Liu, Liping Zheng, Wenming Wu, Benzhu Xu:
UGV-awareness task placement in edge-cloud based urban intelligent video systems. 6563-6577 - Kaouther Gasmi, Salam Hasnaoui:
Dataflow-based automatic parallelization of MATLAB/Simulink models for fitting modern multicore architectures. 6579-6590 - Liyan Xiong, Yijuan Zeng, Xiaohui Huang, Zhida Li, Peng Huang:
MLANet: multi-level attention network with multi-scale feature fusion for crowd counting. 6591-6608 - Gyanapriya Pradhan, Madhukrishna Priyadarsini:
A trusted computing framework for cloud data security using role-based access and pattern recognition. 6609-6622 - Chao Yang, Hong Yang, Donglin Zhu, YiWen Hu, Yu Zhang, HongYuan Ma, Di Zhang:
A multi-mechanism balanced advanced learning sparrow search algorithm for UAV path planning. 6623-6666 - Ankita Choudhary, Meenu Chawla, Namita Tiwari:
A blockchain-based framework for Academic Bank of Credit with transparent credit mobility. 6667-6688 - Zhiying Peng, Yixue Yang, Hao Zhao:
Multi-level spatial-temporal fusion neural network for traffic flow prediction. 6689-6702 - Shivankur Thapliyal, Narender Kumar:
Hyperbolic Sine Optimizer: a new metaheuristic algorithm for high performance computing to address computationally intensive tasks. 6703-6772 - Jiayang Xu, Xiaohui Huang, Ge Song, Zu Gong:
A coupled generative graph convolution network by capturing dynamic relationship of regional flow for traffic prediction. 6773-6786 - Zihan Chen, Haijiang Zhu, Yutong Liu, Xiaoyu Gao:
MSCA-UNet: multi-scale channel attention-based UNet for segmentation of medical ultrasound images. 6787-6804 - Piotr Porwik, Krzysztof Wrobel, Tomasz Orczyk, Rafal Doroz:
FBDD: feature-based drift detector for batch processing data. 6805-6822 - Faten Louati, Farah Barika Ktata, Ikram Amous:
Big-IDS: a decentralized multi agent reinforcement learning approach for distributed intrusion detection in big data networks. 6823-6841 - Reyhaneh Ameri, Mohammad Reza Meybodi:
An improved cellular goore game-based consensus protocol for blockchain. 6843-6868 - Jingyuan Wang, Tianhai Zhao, Yunlan Wang:
Network states-aware collective communication optimization. 6869-6887 - Vidyapati Jha, Priyanka Tripathi:
Decentralized multiple hypothesis testing in Cognitive IOT using massive heterogeneous data. 6889-6929 - Mohammed W. Elbes, Shadi AlZu'bi, Tarek Kanan, Ala Mughaid, Samia A. Abu-Shanab:
Big dermatological data service for precise and immediate diagnosis by utilizing pre-trained learning models. 6931-6951 - Der-Chen Huang, Ling-Chun Liu, Yong-Yuan Deng, Chin-Ling Chen, Kuang-Wei Zeng:
A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS. 6953-6983 - Anjali Choudhary, Ranjit Rajak:
A novel strategy for deterministic workflow scheduling with load balancing using modified min-min heuristic in cloud computing environment. 6985-7006 - Chang Xu, Hongzhou Rao, Liehuang Zhu, Chuan Zhang, Kashif Sharif:
EPVM: efficient and publicly verifiable computation for matrix multiplication with privacy preservation. 7007-7022 - Sumit, Rajender Singh Chhillar, Sandeep Dalal, Surjeet Dalal, Umesh Kumar Lilhore, Sarita Samiya:
A dynamic and optimized routing approach for VANET communication in smart cities to secure intelligent transportation system via a chaotic multi-verse optimization algorithm. 7023-7048 - Yechuan Lin, Shixing Liu:
The integration strategy of information system based on artificial intelligence big data technology in metaverse environment. 7049-7057
Volume 27, Number 6, September 2024
- Parijata Majumdar, Sanjoy Mitra:
Blockchain technology for society 4.0: a comprehensive review of key applications, requirement analysis, research trends, challenges and future avenues. 7059-7081 - Aya H. Allam, Ibrahim Gomaa, Hala H. Zayed, Mohamed Taha:
IoT-based eHealth using blockchain technology: a survey. 7083-7110 - Anil Elakas, Hasan Sözer, Ilgin Safak, Kübra Kalkan:
A systematic mapping on software testing for blockchains. 7111-7126 - Kanishk Dwivedi, Majid Haghparast, Tommi Mikkonen:
Quantum software engineering and quantum software development lifecycle: a survey. 7127-7145 - Hao Cui, Yaning Xiao, Abdelazim G. Hussien, Yanling Guo:
Multi-strategy boosted Aquila optimizer for function optimization and engineering design problems. 7147-7198 - Wei Yang, Yao Shan, Jiaxuan Wang, Yu Yao:
An industrial network intrusion detection algorithm based on IGWO-GRU. 7199-7217 - Yawar Abbas Bangash, Waseem Iqbal, Shynar Mussiraliyeva, Saddaf Rubab, Bilal Rauf:
Reliability through an optimal SDS controller's placement in a SDDC and smart city. 7219-7240 - Junnan Liu, Yongkang Ding, Yifan Liu:
A balanced leader election algorithm based on replica distribution in Kubernetes cluster. 7241-7250 - Yongjun Xiao, Daria K. Voronkova:
A new energy-aware technique to improve the network lifetime of wireless Internet of Things using a most valuable player algorithm. 7251-7271 - Mouaad Mohy-Eddine, Azidine Guezzaz, Said Benkirane, Mourade Azrour:
Malicious detection model with artificial neural network in IoT-based smart farming security. 7307-7322 - Keyvan Ahani, Sepideh Adabi, Parvaneh Asghari:
A real-time stable competitive auction-based task offloading market for heterogeneous mobile cloud (HMC). 7323-7349 - Hadeer S. Hossam, Hala Abdel-Galil, Mohamed Belal:
An energy-aware module placement strategy in fog-based healthcare monitoring systems. 7351-7372 - Tarek Hagras, Gamal A. El-Sayed:
Maintaining the completion-time mechanism for Greening tasks scheduling on DVFS-enabled computing platforms. 7373-7388 - Jatinder Kumar, Ashutosh Kumar Singh:
A secure paillier cryptosystem based privacy-preserving data aggregation and query processing models for smart grid. 7389-7400 - Chengang Dong, Yuhao Tang, Liyan Zhang:
GHA-Inst: a real-time instance segmentation model utilizing YOLO detection framework. 7401-7415 - Antonio Nicolas-Plata, José Luis González Compeán, Víctor Jesús Sosa Sosa:
A service mesh approach to integrate processing patterns into microservices applications. 7417-7438 - Yongxuan Sang, Jiangpo Wei, Zhifeng Zhang, Bo Wang:
A mobility-aware task scheduling by hybrid PSO and GA for mobile edge computing. 7439-7454 - Biroju Papachary, Rajeev Arya, Bhasker Dappuri:
Power-aware QoS-centric strategy for ultra reliable low latency communication in 5G beyond wireless networks. 7455-7468 - Alireza Froozani Fard, Mohammad Reza Mollahoseini Ardakani, Kamal Mirzaie:
Multi-objective task offloading optimization in fog computing environment using INSCSA algorithm. 7469-7491 - Rasheed Ahmad, Izzat Alsmadi:
Data fusion and network intrusion detection systems. 7493-7519 - Arash Heidari, Houshang Shishehlou, Mehdi Darbandi, Nima Jafari Navimipour, Senay Yalçin:
A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree. 7521-7539 - Oussama Aiadi, Belal Khaldi, Aicha Korichi, Mourad Chaa, Mohamed Ben Bezziane, Ibrahim Omara:
Fusion of deep and local gradient-based features for multimodal finger knuckle print identification. 7541-7557 - Davoud Mostafavi Amjad, Behdis Eslamnour:
Locality-aware virtual machine placement based on similarity properties in mobile edge computing. 7559-7580 - Yu Peng, Jia Hao, Yang Chen, Jianhou Gan:
Fine-grained resource adjustment of edge server in cloud-edge collaborative environment. 7581-7598 - Nguyen Tan Cam, Nguyen Ngoc Man:
Uit-DGAdetector: detect domains generated by algorithms using machine learning. 7599-7619 - Nitin Thapliyal, Priti Dimri:
Task scheduling using fuzzy logic with best-fit-decreasing for cloud computing environment. 7621-7636 - Mohammad Al-Khaddour, Majdeddin Ali, Mazen Yousef:
Line-of-sight aware accurate collaborative localization based on joint TDoA and AoA measurements in UWB-MIMO environment. 7637-7655 - Xi-Wei Yang, Xiao-Chun Wu, Yue Shao, Gan Tang:
Energy-delay-aware VNF scheduling: a reinforcement learning approach with hierarchical reward enhancement. 7657-7671 - Danyal Shahmirzadi, Navid Khaledian, Amir Masoud Rahmani:
Analyzing the impact of various parameters on job scheduling in the Google cluster dataset. 7673-7687 - Meeniga Vijaya Lakshmi, Ambidi Naveena, Maddala Vijayalakshmi:
An adaptive vulture based deep belief mechanism for searching user's resources in mobile P2P environment. 7689-7704 - Guokai Wu, Huabin Wang, Weiwei Lin, Ruichao Mo, Xiaoxuan Luo:
FS-DBoost: cross-server energy efficiency and performance prediction in cloud based on transfer regression. 7705-7719 - Mohammed M. Msallam, Syahril Anuar Bin Idris:
Unsupervised text feature selection by binary fire hawk optimizer for text clustering. 7721-7740 - Dexin Zhu, Hu Zhou, Nianfeng Li, Lijun Song, Jun Zheng:
Multi-factor authentication scheme based on custom attributes. 7741-7756 - Joaquín Entrialgo, Rafael Moreno-Vozmediano, José Luis Díaz:
Cost and response time optimization of edge architectures. 7757-7773 - Essam H. Houssein, Mohammed R. Saad, Emre Çelik, Gang Hu, Abdelmgeid A. Ali, Hassan Shaban:
An enhanced sea-horse optimizer for solving global problems and cluster head selection in wireless sensor networks. 7775-7802 - Junqi Chen, Sijie Yang, Yong Wang, Miao Ye, Fan Lei:
Data repair accelerating scheme for erasure-coded storage system based on FPGA and hierarchical parallel decoding structure. 7803-7823 - Abdelaziz I. Hammouri, Malik Sh. Braik, Heba Al-Hiary, Rawan A. Abdeen:
A binary hybrid sine cosine white shark optimizer for feature selection. 7825-7867 - Pooja Kumari, Ankit Kumar Jain:
Timely detection of DDoS attacks in IoT with dimensionality reduction. 7869-7887 - Tao Hai, Arindam Sarkar, Muammer Aksoy, Rahul Karmakar, Sarbajit Manna, Amrita Prasad:
Elevating security and disease forecasting in smart healthcare through artificial neural synchronized federated learning. 7889-7914 - Munish Saini, Eshan Sengupta, Suraaj Thakur:
Artificial intelligence assisted IoT-fog based framework for emergency fire response in smart buildings. 7915-7938 - Munish Saini, Eshan Sengupta, Suraaj Thakur:
Correction: Artificial intelligence assisted IoT-fog based framework for emergency fire response in smart buildings. 7939 - Jiao Han, Kang Jia:
Entity relation joint extraction method for manufacturing industry knowledge data based on improved BERT algorithm. 7941-7954 - Divya Rani, Sachin Tripathi, Ashish Tomar:
BSAS: blockchain-based shareable authentication scheme for smart healthcare. 7955-7979 - Hüseyin Bodur, Imad Fakhri Taha Al Yaseen:
An Improved blockchain-based secure medical record sharing scheme. 7981-8000 - Alireza Souri, Sepehr Ebrahimi Mood, Mingliang Gao, Kuan-Ching Li:
Tournament based equilibrium optimization for minimizing energy consumption on dynamic task scheduling in cloud-edge computing. 8001-8013 - Ruchi Agrawal, Saurabh Singhal, Ashish Sharma:
Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm. 8015-8030 - Xikang Wang, Tongxi Wang, Hua Xiang:
A multi-threaded particle swarm optimization-kmeans algorithm based on MapReduce. 8031-8044 - Xikang Wang, Tongxi Wang, Hua Xiang:
Correction: A multi-threaded particle swarm optimization-kmeans algorithm based on MapReduce. 8045 - Reza Fallahi Kapourchali, Reza Mohammadi, Mohammad Nassiri:
P4httpGuard: detection and prevention of slow-rate DDoS attacks using machine learning techniques in P4 switch. 8047-8064 - Adel Salah Ould Khaoua, Abdelmadjid Boukra, Fella Bey:
On efficient interest forwarding in named data networks over IEEE 802.15.4: a comprehensive performance evaluation. 8065-8097 - Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel:
PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks. 8099-8117 - Youliang Cao, Shaopeng Guan, Debao Wang, Zhenqi Wang:
BE-AC: reliable blockchain-based anti-counterfeiting traceability solution for pharmaceutical industry. 8119-8139 - Sunil Kumar Chowdhary, A. L. N. Rao:
QoS and reliability aware matched bald eagle task scheduling framework based on IoT-cloud in educational applications. 8141-8158 - Deepika Gautam, Sunil Prajapat, Pankaj Kumar, Ashok Kumar Das, Korhan Cengiz, Willy Susilo:
Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage. 8159-8172 - Dani Mertens, Jeha Kim, Jingren Xu, Eunsam Kim, Choonhwa Lee:
Smart flow: a provenance-supported smart contract workflow architecture. 8173-8187 - Archana Chhabra, Rahul Saha, Gulshan Kumar:
PRIBANI: a privacy-ensured framework for blockchain transactions with information retrieval. 8189-8206 - Zhikuan Zhu, Hao Xu, Yingyu He, Zhuoyang Pan, Meiyu Zhang, Chengfeng Jian:
A DRL-based online real-time task scheduling method with ISSA strategy. 8207-8223 - Abdenacer Naouri, Nabil Abdelkader Nouri, Amar Khelloufi, Abdelkarim Ben Sada, Huansheng Ning, Sahraoui Dhelim:
Efficient fog node placement using nature-inspired metaheuristic for IoT applications. 8225-8241 - Arun Kumar Dey, Govind P. Gupta, Satya Prakash Sahu:
BRL-ETDM: Bayesian reinforcement learning-based explainable threat detection model for industry 5.0 network. 8243-8268 - Alaa O. Khadidos, Hariprasath Manoharan, Shitharth Selvarajan, Adil Omar Khadidos, Abdulrhman M. Alshareef, Mohammed Altwijri:
Distribution of resources beyond 5G networks with heterogeneous parallel processing and graph optimization algorithms. 8269-8287 - Anna-Valentini Michailidou, Christos Bellas, Anastasios Gounaris:
Optimizing task allocation in multi-query edge analytics. 8289-8306 - Yuefeng Xu, Rui Zhong, Chao Zhang, Jun Yu:
Multiplayer battle game-inspired optimizer for complex optimization problems. 8307-8331 - Ashish Kumar, Kakali Chatterjee:
Securing internet of medical devices using energy efficient blockchain for healthcare 4.0. 8333-8348 - Xiaozong Wang, Fengqin Tang, Yuanyuan Wang, Cuixia Li, Xuejing Zhao:
Community detection in attributed networks using neighborhood information. 8349-8366 - Ahsan Nazir, Jingsha He, Nafei Zhu, Muhammad Shahid Anwar, Muhammad Salman Pathan:
Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain. 8367-8392 - Hongbo Zhang, Xiwen Qin, Xueliang Gao:
Probe mechanism based particle swarm optimization for feature selection. 8393-8411 - Reyhane Ghafari, Najme Mansouri:
A novel energy-based task scheduling in fog computing environment: an improved artificial rabbits optimization approach. 8413-8458 - Yuanchun Lan, Jiahao Ling, Xiaohui Huang, Junyang Wang, Zhuyi Hu, Liyan Xiong:
A local global attention based spatiotemporal network for traffic flow forecasting. 8459-8475 - He Lu, Yanan Zhao, Yajing Song, Yang Yang, Guanjie He, Haiyang Yu, Yilong Ren:
A transfer learning-based intrusion detection system for zero-day attack in communication-based train control system. 8477-8492 - Ruiqi Song, Weike Nie, Aiqin Hou, Suqin Xue:
Dynamic random mutation hybrid Harris hawk optimization and its application to training kernel extreme learning machine. 8493-8530 - Yuan Zhao, Hongmin Gao, Shuangshuang Yuan, Yan Li:
A task offloading strategy considering forwarding errors based on cloud-fog collaboration. 8531-8555 - Veeramani Shanmugam, Huo-Chong Ling, Lenin Gopal, Sivaraman Eswaran, Choo W. R. Chiong:
Network-aware virtual machine placement using enriched butterfly optimisation algorithm in cloud computing paradigm. 8557-8575 - Santosh Shakya, Priyanka Tripathi:
A background-based new scheduling approach for scheduling the IoT network task with data storage in cloud environment. 8577-8594 - Yunsheng Tian, Dan Zhang, Hongbo Zhang, Juan Zhu, Xiaofeng Yue:
An improved cuckoo search algorithm for global optimization. 8595-8619 - Chanki Kim, Kang-Wook Chon:
Accelerating erasure coding by exploiting multiple repair paths in distributed storage systems. 8621-8635 - Chanki Kim, Kang-Wook Chon:
Correction: Accelerating erasure coding by exploiting multiple repair paths in distributed storage systems. 8637
Volume 27, Number 7, October 2024
- Lili Nemec Zlatolas, Tatjana Welzer, Lenka Lhotská:
Data breaches in healthcare: security mechanisms for attack mitigation. 8639-8654 - Rafika Saadouni, Chirihane Gherbi, Zibouda Aliouat, Yasmine Harbi, Amina Khacha:
Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature. 8655-8681 - Fatma Hendaoui, Ahlem Ferchichi, Lamia Trabelsi, Rahma Meddeb, Rawia Ahmed, Manel Khazri Khelifi:
Advances in deep learning intrusion detection over encrypted data with privacy preservation: a systematic review. 8683-8724 - Tanya Garg, Shashank Gupta, Mohammad S. Obaidat, Meghna Raj:
Drones as a service (DaaS) for 5G networks and blockchain-assisted IoT-based smart city infrastructure. 8725-8788 - Wengui Hu, Qingsong Cao, Mehdi Darbandi, Nima Jafari Navimipour:
A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques, challenges, and future directions. 8789-8815 - Yasar Khan, Saad Mustafa, Raja Wasim Ahmad, Tahir Maqsood, Faisal Rehman, Javid Ali, Joel J. P. C. Rodrigues:
Content caching in mobile edge computing: a survey. 8817-8864 - Daisy Nkele Molokomme, Adeiza James Onumanyi, Adnan M. Abu-Mahfouz:
Hybrid metaheuristic schemes with different configurations and feedback mechanisms for optimal clustering applications. 8865-8887 - Pravali Manchala, Manjubala Bisi:
TSoptEE: two-stage optimization technique for software development effort estimation. 8889-8908 - Chandra Bhushan Kumar Yadav, Dinesh Dash:
An efficient partial charging and data gathering strategy using multiple mobile vehicles in wireless rechargeable sensor networks. 8909-8930 - Yuxin Yang, Yihang Luo, Guangzhuo Zhu:
An optimized federated learning method based on soft label grouping for heterogeneous IoT. 8931-8938 - Zahra Jafari, Ahmad Habibizad Navin, Azadeh Zamanifar:
Task scheduling approach in fog and cloud computing using Jellyfish Search (JS) optimizer and Improved Harris Hawks optimization (IHHO) algorithm enhanced by deep learning. 8939-8963 - Angel M. Gama Garcia, José Maria Alcaraz Calero, Higinio Mora Mora, Qi Wang:
ServiceNet: resource-efficient architecture for topology discovery in large-scale multi-tenant clouds. 8965-8982 - K. Dilsad Çiçek, Taymaz Akan, Oguz Bayat:
Multi-modal Battle Royale optimizer. 8983-8993 - Ratul Sikder, Md. Shohrab Hossain, Mohammed J. F. Alenazi, Mohammed Atiquzzaman:
A relaxed and faster switch migration framework to balance the load of distributed control plane in software defined networks. 8995-9012 - Sunil Prajapat, Pankaj Kumar, Sandeep Kumar:
A privacy preserving quantum authentication scheme for secure data sharing in wireless body area networks. 9013-9029 - Muhammad Awais, Muhammad Adnan Khan, Zia Bashir:
Exploring the stochastic patterns of hyperchaotic Lorenz systems with variable fractional order and radial basis function networks. 9031-9064 - Ali Ghaffari, Nasim Jelodari, Samira pouralish, Nahideh Derakhshanfard, Bahman Arasteh:
Securing internet of things using machine and deep learning methods: a survey. 9065-9089 - Mohd Akbar, Mohammed Mujtaba Waseem, Syeda Husna Mehanoor, Praveen Barmavatu:
Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing. 9091-9105 - Mehmet Ulvi Simsek, Ibrahim Kök, Suat Özdemir:
Cepair: an AI-powered and fog-based predictive CEP system for air quality monitoring. 9107-9121 - Reid Prichard, Wayne Strasser:
When Fewer Cores Is Faster: A Parametric Study of Undersubscription in High-Performance Computing. 9123-9136 - Jianlan Wang, Zhendong Wang, Donglin Zhu, Shuxin Yang, Junling Wang, Dahai Li:
Reinforcement learning marine predators algorithm for global optimization. 9137-9190 - K. A. Asmitha, Vinod Puthuvath, Rafidha Rehiman K. A., S. L. Ananth:
Deep learning vs. adversarial noise: a battle in malware image analysis. 9191-9220 - Shahab Safaee, Meghdad Mirabi, Ali Asghar Safaei:
StreamFilter: a framework for distributed processing of range queries over streaming data with fine-grained access control. 9221-9241 - Sagnik Datta, Suyel Namasudra:
Blockchain-based secure and scalable supply chain management system to prevent drug counterfeiting. 9243-9260 - Abdulaziz Aldaej, Tariq Ahamed Ahanger, Mohammed Atiquzzaman, Imdad Ullah:
A comprehensive node-based botnet detection framework for IoT network. 9261-9281 - Heng Zhang, Yihong Zhang, Yanli Liu, Neal Naixue Xiong, Yawei Li:
Slam loop closure detection algorithm based on MSA-SG. 9283-9301 - Ruiling Tian, Yadan Xue, Yibo Hao, Yuting Song:
Optimal analysis in cognitive radio networks with imperfect sensing based on retrial queues with feedback and priority. 9303-9322 - Ahmad Awan, Muhammad Aleem, Altaf Hussain, Radu Prodan:
DFARM: a deadline-aware fault-tolerant scheduler for cloud computing. 9323-9344 - Essam H. Houssein, Mahmoud Khalaf Saeed, Gang Hu, Mustafa M. Al-Sayed:
An efficient improved exponential distribution optimizer: application to the global, engineering and combinatorial optimization problems. 9345-9380 - Haythem Bany Salameh, Ayyoub Hussienat, Mohannad Alhafnawi, Ahmad Al Ajlouni:
Autonomous UAV-based surveillance system for multi-target detection using reinforcement learning. 9381-9394 - Sujit Biswas, Rajat Subhra Goswami, K. Hemant Kumar Reddy:
Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart cities. 9395-9414 - Sadananda Lingayya, Sathyendra Bhat Jodumutt, Sanjay Rangrao Pawar, Anoop Vylala, Senthilkumar Chandrasekaran:
Dynamic task offloading for resource allocation and privacy-preserving framework in Kubeedge-based edge computing using machine learning. 9415-9431 - Sadananda Lingayya, Sathyendra Bhat Jodumutt, Sanjay Rangrao Pawar, Anoop Vylala, Senthilkumar Chandrasekaran:
Correction: Dynamic task offloading for resource allocation and privacy-preserving framework in Kubeedge-based edge computing using machine learning. 9433 - Miguel Landry Foko Sindjoung, Mthulisi Velempini, Vianney Kengne Tchendji:
ARPMEC: an adaptive mobile edge computing-based routing protocol for IoT networks. 9435-9450 - Ali Hosseinalipour, Reza Ghanbarzadeh, Bahman Arasteh, Farhad Soleimanian Gharehchopogh, Seyedali Mirjalili:
A metaheuristic approach based on coronavirus herd immunity optimiser for breast cancer diagnosis. 9451-9475 - Najib Mouhassine, Mohamed Moughit:
A mean opinion score prediction model for VoIP calls offloading handover from LTE to WiFi. 9477-9495 - Mohammed Jasim, Nazli Siasi:
Hybrid-grained migration method for load redistribution in heavily-loaded fog nodes. 9497-9507 - Chengtian Ouyang, Chang Liao, Donglin Zhu, Yangyang Zheng, Changjun Zhou, Chengye Zou:
Compound improved Harris hawks optimization for global and engineering optimization. 9509-9568 - Somayeh Danesh, Javad Akbari Torkestani:
CLARA: clustered learning automata-based routing algorithm for efficient FANET communication. 9569-9585 - Çigdem Avci Salma, Bedir Tekinerdogan, Cagatay Catal:
Design tactics for tailoring transformer architectures to cybersecurity challenges. 9587-9613 - Zhao Xu, Zhiyang Jia, YiWei Wei, Shuyan Zhang, Zhong Jin, Wenpei Dong:
CSDANet: a new lightweight fault diagnosis framework towards heavy noise and small samples. 9615-9634 - Zaid Mustafa, Rashid Amin, Hamza Aldabbas, Naeem Ahmed:
Intrusion detection systems for software-defined networks: a comprehensive study on machine learning-based techniques. 9635-9661 - Chengang Dong, Yuhao Tang, Hanyue Zhu, Liyan Zhang:
HCA-YOLO: a non-salient object detection method based on hierarchical attention mechanism. 9663-9678 - Jaehwan Park, Zeinab Rezaeifar, Changhee Hahn:
Securing multi-client range queries over encrypted data. 9679-9692 - Hui Zeng, Xuewei Duan, Xiaohui Huang, Qiang Cui:
STA-former: encoding traffic flows with spatio-temporal associations in transformer networks for prediction. 9693-9714 - Huangshui Hu, Xinji Fan, Chuhang Wang, Wang Tingting, Yuhuan Deng:
Particle swarm optimization and fuzzy logic based clustering and routing protocol to enhance lifetime for wireless sensor networks. 9715-9734 - Arthur Sabino, Luiz Nelson Lima, Carlos Brito, Leonel Feitosa, Marcos F. Caetano, Priscila Solís Barreto, Francisco Airton Silva:
Forest fire monitoring system supported by unmanned aerial vehicles and edge computing: a performance evaluation using petri nets. 9735-9755 - Arjun Singh, Preeti Mishra, P. Vinod, Avantika Gaur, Mauro Conti:
SFC-NIDS: a sustainable and explainable flow filtering based concept drift-driven security approach for network introspection. 9757-9782 - Wei Sun, Lang Li, Xiantong Huang:
LTLBC: a low-latency lightweight block cipher for internet of things. 9783-9794 - Cheng Wang, Lin Chen, Chengjie Tang, Yongsong Wang, Yaqiao Xian, Yuhao Zhao, Hai Xue, Zhan Huan:
Enhanced time-sensitive networking configuration detection using optimized BPNN with feature selection for industry 4.0. 9795-9810 - Mohd Ahsan Siddiqui, C. Rama Krishna, Mala Kalra:
Anomaly detection framework for IoT-enabled appliances using machine learning. 9811-9835 - Ying Shen, Zhanyou Ma, Zishu Jiang, Yahui Li, Guoli Qin:
Performance analysis of P2P network based on differentiated service Geo/Geo/1 + 1 queue. 9837-9849 - Wael Khalafalla, Wen-Xing Zhu, Ahmed Elkhalil, Issameldeen Elfadul:
Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs. 9851-9871 - Posham Bhargava Reddy, Chapram Sudhakar:
IOTD: intelligent offloading of tasks with deadlines in edge-fog-cloud computing environment using hybrid approach. 9873-9885 - Fengxian Wang, Senlin Bi, Shaozhi Feng, Huanlong Zhang, Chenglin Guo:
Combined economic and emission power dispatch problems through multi-objective Honey Badger optimizer. 9887-9915 - Elsayed Elsedimy, Hala Elhadidy, Sara M. M. Abo Hashish:
A novel intrusion detection system based on a hybrid quantum support vector machine and improved Grey Wolf optimizer. 9917-9935 - Meng Cui, Jue Chen, Xihe Qiu, Wenjing Lv, Haijun Qin, Xinyu Zhang:
Multi-class intrusion detection system in SDN based on hybrid BiLSTM model. 9937-9956 - Kai Zhang, Tao Chen, Siyuan Chen, Lifei Wei, Jianting Ning:
Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access control. 9957-9973 - Nasim Soltani, Amir Masoud Rahmani, Mahdi Bohlouli, Mehdi Hosseinzadeh:
Robust intrusion detection for network communication on the Internet of Things: a hybrid machine learning approach. 9975-9991 - Shivendu Mishra, Anurag Choubey, Sri Vaibhav Devarasetty, Nelson Sharma, Rajiv Misra:
An innovative multi-head attention model with BiMGRU for real-time electric vehicle charging management through deep reinforcement learning. 9993-10023 - Ernest Ntizikira, Lei Wang, Jenhui Chen, Xinxin Lu:
Attention-based ResNet for intrusion detection and severity analysis using sliding window blockchain and firewall in IoT. 10025-10051 - Yunpeng Wang, Jixiang Zhang, Mengjian Zhang, Deguang Wang, Ming Yang:
Enhanced artificial ecosystem-based optimization for global optimization and constrained engineering problems. 10053-10092 - Bahman Arasteh, Keyvan Arasteh, Ali Ghaffari, Reza Ghanbarzadeh:
A new binary chaos-based metaheuristic algorithm for software defect prediction. 10093-10123 - Jiaofen Nan, Siyuan Zhang, Duan Li, Kaifan Zhang, Chuang Han, Yinghui Meng, Tanxin Zhu:
Innovative combination of covariance analysis-based sliding time window and task-related component analysis for steady-state visual evoked potential recognition. 10125-10139 - Rui Zhong, Qinqin Fan, Chao Zhang, Jun Yu:
Hybrid remora crayfish optimization for engineering and wireless sensor network coverage optimization. 10141-10168 - Prity Rani, Rohit Kumar Sachan, Sonal Kukreja:
Educert-chain: a secure and notarized educational certificate authentication and verification system using permissioned blockchain. 10169-10196 - Nastaran Mehrabi Hashjin, Mohammad Hussein Amiri, Ardashir Mohammadzadeh, Seyedali Mirjalili, Nima Khodadadi:
Novel hybrid classifier based on fuzzy type-III decision maker and ensemble deep learning model and improved chaos game optimization. 10197-10234
Volume 27, Number 8, November 2024
- Alper Alimoglu, Can C. Özturan:
An autonomous blockchain-based workflow execution broker for e-science. 10235-10244 - Zigang Chen, Fan Liu, Danlong Li, Yuhong Liu, Xingchun Yang, Haihua Zhu:
Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme. 10245-10264 - Navid Khaledian, Marcus Völp, Sadoon Azizi, Mirsaeid Hosseini Shirvani:
AI-based & heuristic workflow scheduling in cloud and fog computing: a systematic review. 10265-10298 - Takwa Allaoui, Kaouther Gasmi, Tahar Ezzedine:
Reinforcement learning based task offloading of IoT applications in fog computing: algorithms and optimization techniques. 10299-10324 - Mamta Narwaria, Shruti Jaiswal:
Multicriteria client selection model using class topper optimization based optimal federated learning for healthcare informatics. 10325-10342 - Xu Yang, Feiyang Wu, Linqiu Gui, Shengshi Zhong:
A tube-based model predictive control method for intelligent vehicles path tracking. 10343-10357 - Ala Mughaid, Asma Alnajjar, Subhieh M. El-Salhi, Khaled Almakadmeh, Shadi AlZu'bi:
A cutting-edge intelligent cyber model for intrusion detection in IoT environments leveraging future generations networks. 10359-10375 - Mahdieh Maazalahi, Soodeh Hosseini:
K-means and meta-heuristic algorithms for intrusion detection systems. 10377-10419 - Xing Huang, Li Li, Wei Wang, Lu Liu, Meng Li:
Intelligent patrol inspection of low code enabled electric power communication equipment based on digital transformation. 10421-10435 - Xiaolong Zhao, Zhenjie Huang:
Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing. 10437-10453 - Sahar Cherif, Hamdi Kchaou, Amel Ksibi, Ghadah Aldehim:
Medical diagnosis using interval type-2 fuzzy similarity measures. 10455-10466 - Gökçe Karacayilmaz, Harun Artuner:
A novel approach detection for IIoT attacks via artificial intelligence. 10467-10485 - Malik Braik, Mohammed A. Awadallah, Hussein Alzoubi, Heba Al-Hiary, Abdelazim G. Hussien:
Adaptive dynamic elite opposition-based Ali Baba and the forty thieves algorithm for high-dimensional feature selection. 10487-10523 - Kajol Mittal, Payal Khurana Batra:
Graph-ensemble fusion for enhanced IoT intrusion detection: leveraging GCN and deep learning. 10525-10552 - Xiaofei Zhao, Mengqian Yang, Hongji Yang:
A knowledge graph embedding model based on multi-level analogical reasoning. 10553-10567 - Piyush Sewal, Hari Singh:
Performance optimization of Spark MLlib workloads using cost efficient RICG model on exponential projective sampling. 10569-10588 - Nima Khodadadi, Ehsan Khodadadi, Benyamin Abdollahzadeh, El-Sayed M. El-Kenawy, Pezhman Mardanpour, Weiguo Zhao, Farhad Soleimanian Gharehchopogh, Seyedali Mirjalili:
Multi-objective generalized normal distribution optimization: a novel algorithm for multi-objective problems. 10589-10631 - Jhuma Dutta, Subhas Barman, Soubhik Sen, Aniruddha Routh, Matangini Chattopadhyay, Samiran Chattopadhyay:
Easypay: a user-friendly blockchain-powered payment gateway. 10633-10652 - Swathi Baswaraju, Soma Sekhar Kolisetty, G. Venkata Sivanarayana, Srinivasa Rao Battula:
Efficientnetv2-RegNet: an effective deep learning framework for secure SDN based IOT network. 10653-10670 - Zhendong Wang, Donghui Dai, Zhiyuan Zeng, Daojing He, Sammy Chan:
Multi-strategy enhanced Grey Wolf Optimizer for global optimization and real world problems. 10671-10715 - Safwan Omari, Kshitiz Basnet, Mohammad Wardat:
Investigating large language models capabilities for automatic code repair in Python. 10717-10731 - Bo Wen, Shanzhi Li, Hooman Motevalli:
Exploitation of healthcare IoT-fog-based smart e-health gateways: a resource optimization approach. 10733-10755 - Lei An, Jiankai Qiu, Hanzhi Zhang, Chen Liu:
Design of distributed network intrusion prevention system based on Spark and P2DR models. 10757-10776 - Hongye Li, Jianan Wang, Yanjie Zhu:
Integration of bat algorithm and salp swarm intelligence with stochastic difference variants for global optimization. 10777-10818 - Buqing Cao, Siyuan Wang, Xiang Xie, Qian Peng, Yating Yi, Zhenlian Peng:
ARIR: an intent recognition-based approach for API recommendation. 10819-10832 - Nasir Ahmad Jalali, Hongsong Chen:
Comprehensive framework for implementing blockchain-enabled federated learning and full homomorphic encryption for chatbot security system. 10859-10882 - Rohit Singh, Krishna Pal Sharma, Lalit Kumar Awasthi:
A machine learning-based ensemble model for securing the IoT network. 10883-10897 - Neelam Gupta, Sarvesh Tanwar, Sumit Badotra:
Performance analysis of ODL and RYU controllers' against DDoS attack in software defined networks. 10899-10919 - Sumit Bansal, Himanshu Aggarwal:
A multiobjective optimization of task workflow scheduling using hybridization of PSO and WOA algorithms in cloud-fog computing. 10921-10952 - Shiva Sharma, Manjit Kaur, Naresh Kumar:
Enhanced 3D indoor position estimation from smartphone's inbuilt IMU and pressure sensor via hybrid approach. 10953-10970 - Shristy Gupta, Amritesh Kumar, Lokendra Vishwakarma, Debasis Das:
Enhancing blockchain scalability and security: the early fraud detection (EFD) framework for optimistic rollups. 10971-10992 - Shabnam Bawa, Prashant Singh Rana, Rajkumar Tekchandani:
Multivariate time series ensemble model for load prediction on hosts using anomaly detection techniques. 10993-11016 - Yaru Chen, Jie Zhou, Xingshi He, Xinglong Luo:
An improved density peaks clustering based on sparrow search algorithm. 11017-11037 - Rahma Djiroun, Meriem Amel Guessoum, Kamel Boukhalfa, Elhadje Benkhelifa:
Natural language why-question answering system in business intelligence context. 11039-11067 - Apurva Khandekar, Sheikh Fahad Ahmad:
Secured IoT architecture for personalized marketing using blockchain framework with deep learning technology. 11069-11084 - Khaoula Braiki, Habib Youssef:
An experimental and comparative study examining resource utilization in cloud data center. 11085-11102 - Abdullah Aljumah, Tariq Ahamed Ahanger, Imdad Ullah:
Internet of things-based secure architecture to automate industry. 11103-11118 - Yu Tang, Qi Dai, Mengyuan Yang, Lifang Chen, Ye Du:
Software defect prediction ensemble learning algorithm based on 2-step sparrow optimizing extreme learning machine. 11119-11148 - Hassan Harb, Mohamad Hijazi, Mohamed-el-Amine Brahmia, Ali Kadhum Idrees, Mouhammad AlAkkoumi, Ali Jaber, Abdelhafid Abouaissa:
An intelligent mechanism for energy consumption scheduling in smart buildings. 11149-11165 - Ananya Chakraborty, Mohit Kumar, Nisha Chaurasia:
An intelligent offloading and resource allocation using Fuzzy-based HHGA algorithm for IoT applications. 11167-11185 - Ishak Paçal, Omer Celik, Bilal Bayram, António Cunha:
Enhancing EfficientNetv2 with global and efficient channel attention mechanisms for accurate MRI-Based brain tumor classification. 11187-11212 - Jia-Lin Chan, Wai-Kong Lee, Denis Chee-Keong Wong, Wun-She Yap, Boon-Yaik Ooi, Bok-Min Goi:
High throughput acceleration of NIST lightweight authenticated encryption schemes on GPU platform. 11213-11235 - Muhammad Asad, Safa Otoum:
Federated learning for efficient spectrum allocation in open RAN. 11237-11247 - Amira Rayane Benamer, Nejib Ben Hadj-Alouane, Khaled Boussetta, Atidel B. Hadj-Alouane:
A Genetic Algorithm-based approach for placement in the fog of latency-sensitive multiplayer game servers. 11249-11275 - Zeynep Garip, Ekin Ekinci, Kasim Serbest, Süleyman Eken:
Chaotic marine predator optimization algorithm for feature selection in schizophrenia classification using EEG signals. 11277-11297 - Jian Zheng, Lin Li, Shiyan Wang, Huyong Yan:
Binary classification for imbalanced datasets using twin hyperspheres based on conformal method. 11299-11315 - Bo Liu, Guo Zhou, Yongquan Zhou, Qifang Luo, Yuanfei Wei:
Quantum-inspired multi-objective African vultures optimization algorithm with hierarchical structure for software requirement. 11317-11345 - PLS Jayalaxmi, Manali Chakraborty, Rahul Saha, Gulshan Kumar, Mauro Conti:
MADESANT: malware detection and severity analysis in industrial environments. 11347-11367 - Sanjeev Sharma, Mahendra Pratap Yadav:
A collective approach to reach known and unknown target in multi agent environment using nature inspired algorithms. 11369-11392 - Yalian Yang, Xinyu Luo, Wei Li, Changdong Liu, Qing Ye, Peng Liang:
AAPF*: a safer autonomous vehicle path planning algorithm based on the improved A* algorithm and APF algorithm. 11393-11406 - Arif Ullah, Zakaria Alomari, Suboh Alkhushayni, Du'a Al-Zaleq, Mohammad Bany Taha, Hassnae Remmach:
Improvement in task allocation for VM and reduction of Makespan in IaaS model for cloud computing. 11407-11426 - Medha Kirti, Ashish Kumar Maurya, Rama Shankar Yadav:
Fault-tolerant allocation of deadline-constrained tasks through preemptive migration in heterogeneous cloud environments. 11427-11454 - Mingyan Li, Shuo Wang, Tao Huang, Yunjie Liu:
MPTD: optimizing multi-path transport with dynamic target delay in datacenters. 11455-11469 - Mostafa Matin, Amin Mehranzadeh, Mohsen Chekin, Mohammad Mosleh:
HTPA: a hybrid traffic pattern aware arbitration strategy for network on chip systems. 11471-11489 - Fazal Waris, Feipeng Da, Shanghuan Liu:
Stacked ensemble learning for facial gender classification using deep learning based features extraction. 11491-11513 - Hongzhi Li, Dun Li, Wei Liang:
A smart contract-driven access control scheme with integrity checking for electronic health records. 11515-11535 - Tengjiao Liu:
XsimGCL's cross-layer for group recommendation using extremely simple graph contrastive learning. 11537-11552 - Haodi Quan, Yun Zhang, Qiaoqin Li, Yongguo Liu:
TPBFS: two populations based feature selection method for medical data. 11553-11568 - Anita Thakur, Virender Ranga, Ritu Agarwal:
Workload dynamics implications in permissioned blockchain scalability and performance. 11569-11593 - Xi Liu, Jun Liu, Hong Wu, Jing Dong:
A family of truthful mechanisms for resource allocation with multi-attribute demand in mobile edge computing. 11595-11610 - Limin Xia, Weiye Fu:
Spatial-temporal multiscale feature optimization based two-stream convolutional neural network for action recognition. 11611-11626 - Conrado P. Vizcarra, Shadan Alhamed, Abdulelah Abdallah Algosaibi, Mohammed Alnaeem, Adel Aldalbahi, Nura Aljaafari, Ahmad Sawalmeh, Mahmoud Nazzal, Abdallah Khreishah, Abdulaziz Alhumam, Muhammad Anan:
Deep learning adversarial attacks and defenses on license plate recognition system. 11627-11644 - Komal Singh Gill, Sharad Saxena, Anju Sharma, Arwinder Dhillon:
GTBNN: game-theoretic and bayesian neural networks to tackle security attacks in intelligent transportation systems. 11645-11665 - Peng Chen, Shengwei Tian, Xin Wang, Xinjun Pei, Weitao Nong, Hao Zhang:
Efficient malware detection through inter-component communication analysis. 11667-11682 - Abdelkader Ouared, Moussa Amrani, Abdelhafid Chadli, Pierre-Yves Schobbens:
Deep variability modeling to enhance reproducibility of database performance testing. 11683-11708 - Hongrui Lin, Guodong Liu, Weiwei Lin, Xinhua Wang, Xiumin Wang:
A novel virtual machine consolidation algorithm with server power mode management for energy-efficient cloud data centers. 11709-11725 - Nidhi Malik, Neeti Sangwan, Navdeep Bohra, Ashish Kumari, Dinesh Sheoran, Manya Dabas:
HyperSegRec: enhanced hypergraph-based recommendation system with user segmentation and item similarity learning. 11727-11745 - Behnam Mohammad Hasani Zade, Najme Mansouri, Mohammad Masoud Javidi:
Multi-objective task scheduling based on PSO-Ring and intuitionistic fuzzy set. 11747-11802 - Lizia Sahkhar, Bunil Kumar Balabantaray, Sanjaya Kumar Panda:
Mobility-enhanced delay-aware cloudlet movement and placement using cluster-based technique in a smart healthcare platform. 11803-11821 - Zhihe Yang, Xiaogang Wang, Rongting Li, Yangli Liu:
HMM-CPM: a cloud instance resource prediction method tracing the workload trends via hidden Markov model. 11823-11838
Volume 27, Number 9, December 2024
- Atul Barve, Pushpinder Singh Patheja:
A hybrid deep learning based enhanced and reliable approach for VANET intrusion detection system. 11839-11850 - Abhishek Srivastava, Dushmanta Kumar Das, Siseyiekuo Khatsu:
Optimal power scheduling of microgrid considering renewable sources and demand response management. 11851-11872 - G. Sucharitha, Deepthi Godavarthi, Janjhyam Venkata Naga Ramesh, Muhammad Ijaz Khan:
Secure and efficient content-based image retrieval using dominant local patterns and watermark encryption in cloud computing. 11873-11889 - Yayin He, Xiangshun Li:
Causal network construction based on KICA-ECCM for root cause diagnosis of industrial processes. 11891-11909 - Mengjian Zhang, Guihua Wen, Pei Yang:
Chaos-BBO: Chaos balanced butterfly optimizer with dynamic continuum chaotic strategies and its applications. 11911-11952 - Sasidharan Velu, Sukhpal Singh Gill, Subramaniam Subramanian Murugesan, Huaming Wu, Xingwang Li:
CloudAIBus: a testbed for AI based cloud computing environments. 11953-11981 - Ashish Kumari, Shailender Kumar, Ram Shringar Raw:
Modified clustering and incentivized stable CH selection for reliable VANET communication. 11983-12005 - Jiao Li, Wanting Zhao:
Blockchain cross-chain protocol based on improved hashed time-locked contract. 12007-12027 - V. R. Rajasekar, S. Rajkumar:
DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN. 12029-12068 - Hui Zeng, Qiang Cui, Xiaohui Huang, Xuewei Duan:
STTD: spatial-temporal transformer with double recurrent graph convolutional cooperative network for traffic flow prediction. 12069-12089 - Yuhong Sun, Jiatao Wang, Fengyin Li:
Efficient integer division computation protocols based on partial homomorphic encryption. 12091-12102 - Yuhong Sun, Jiatao Wang, Fengyin Li:
Correction: Efficient integer division computation protocols based on partial homomorphic encryption. 12103 - Xiaoping Zhao, Qianqian Su:
Time-limited ownership delegation scheme with revocation security for healthcare. 12105-12121 - Xin Li:
A faster deep graph clustering network based on dynamic graph weight update mechanism. 12123-12140 - Taief Alaa Alamiedy, Mohammed Anbar, Bahari Belaton:
OPSMOTE-ML: an optimized SMOTE with machine learning models for selective forwarding attack detection in low power and lossy networks of internet of things. 12141-12184 - Ruchika Malhotra, Kishwar Khan:
A novel software defect prediction model using two-phase grey wolf optimisation for feature selection. 12185-12207 - Rui Zhong, Jun Yu:
A novel evolutionary status guided hyper-heuristic algorithm for continuous optimization. 12209-12238 - Rui Zhong, Jun Yu:
DEA2H2: differential evolution architecture based adaptive hyper-heuristic algorithm for continuous optimization. 12239-12266 - Burhan Sher, Mustafeez Ahmad, Khwaja Mansoor, Yawar Abbas Bangash, Waseem Iqbal, Shynar Mussiraliyeva:
Lightweight secure authentication protocol for automatic dependent surveillance broadcast system. 12267-12282 - Feifan Wang, Nuojing Liang, Faguo Wu, Bo Zhou, Jiawei Nie, Xiao Zhang:
Three-party evolutionary game-based analysis and stability enhancement of improved PBFT consensus mechanism. 12283-12309 - Wenlong Zhao, Yuanchao Hu, Xiaopeng Yan, Xiaowei Liu, Rixian Ding, Chaofeng Dai, Ying Cao:
Enhanced K-NN with Bayesian optimization algorithm for predicting energy efficiency of smart grids in IoT. 12311-12322 - Chengang Dong, Yuhao Tang, Liyan Zhang:
MDA-YOLO Person: a 2D human pose estimation model based on YOLO detection framework. 12323-12340 - D. Praveena Anjelin, S. Ganesh Kumar:
An effective classification using enhanced elephant herding optimization with convolution neural network for intrusion detection in IoMT architecture. 12341-12359 - Haobin Zhang, Hongjun San, Jiupeng Chen, Haijie Sun, Lin Ding, Xingmei Wu:
Black eagle optimizer: a metaheuristic optimization method for solving engineering optimization problems. 12361-12393 - Carlos Melo, Glauber D. Gonçalves, Francisco Airton Silva, André Soares:
A comprehensive hyperledger fabric performance evaluation based on resources capacity planning. 12395-12410 - Si-Wen Zhang, Jie-Sheng Wang, Shi-Hui Zhang, Yu-Xuan Xing, Yun-Cheng Sun, Yuan-Zheng Gao:
Task scheduling in cloud computing systems using honey badger algorithm with improved density factor and foucault pendulum motion. 12411-12457 - Sheharyar Khan, Jiangbin Zheng, Hassan Ali:
Soft computing approaches for dynamic multi-objective evaluation of computational offloading: a literature review. 12459-12481 - Rui Zhong, Jun Yu:
Gene-targeting multiplayer battle game optimizer for large-scale global optimization via cooperative coevolution. 12483-12508 - Kandoussi el Mehdi, Adam Houmairi, Iman El Mir, Mostafa Bellafkih:
Enhancing cloud security: harnessing bayesian game theory for a dynamic defense mechanism. 12509-12526 - Xiaohua Wu, Jinpeng Chang, Zirui Wang, Jun Cheng:
DyPoA: enhanced PoA protocol with a dynamic set of validators for IoT. 12527-12545 - Guilherme Galante, Rodrigo da Rosa Righi, Cristiane de Andrade:
Extending parallel programming patterns with adaptability features. 12547-12568 - Li Yuan, Xiongjun Tian, Jiacheng Yuan, Jingyu zhang, Xiaojing Dai, Ali Asghar Heidari, Huiling Chen, Sudan Yu:
Enhancing network security with information-guided-enhanced Runge Kutta feature selection for intrusion detection. 12569-12602 - Kavitha Dhanushkodi, Raushan Kumar, Pratyush Mittal, Saumye Saran Das, Neelam Naga Saivenkata Suryavenu, Kiruthika Venkataramani:
Enhancing resource utilization and privacy in IoT data placement through fuzzy logic and PSO optimization. 12603-12626 - Anas M. R. Alsobeh, Khalid Gaber, Mahmoud M. Hammad, Maryam Nuser, Amani M. Shatnawi:
Android malware detection using time-aware machine learning approach. 12627-12648 - Fatma Hendaoui, Hamdi Eltaief, Habib Youssef:
Enhancing data authentication in software-defined networking (SDN) using multiparty computation. 12649-12668 - Yun Sun, Yu Li, Weihang Zhang, Fengju Zhang, Hanruo Liu, Ningli Wang, Huiqi Li:
Automatic diagnosis of myopic maculopathy using continuous severity ranking labels. 12669-12688 - Wei Hu, Ji Feng, Degang Yang:
An improved density peaks clustering algorithm using similarity assignment strategy with K-nearest neighbors. 12689-12706 - Krishna Kant Agrawal, Devesh Mishra, Nitin Kumar Gaur, Vandana Yadav, Brijesh Mishra:
Machine learning driven four-elements high gain MIMO antenna for wireless connectivity. 12707-12725 - Qun Zhou, Wenting Shen:
PPFLV: privacy-preserving federated learning with verifiability. 12727-12743 - Ali Mohammadzadeh, Seyedali Mirjalili:
Eel and grouper optimizer: a nature-inspired optimization algorithm. 12745-12786 - Alparslan Fisne, M. Mücahit Enes Yurtsever, Süleyman Eken:
Energy-efficient buildings with energy-efficient optimized models: a case study on thermal bridge detection. 12787-12797 - Essam H. Houssein, Doaa A. Abdelkareem, Gang Hu, Mohamed Abdel Hameed, Ibrahim A. Ibrahim, Mina Younan:
An effective multiclass skin cancer classification approach based on deep convolutional neural network. 12799-12819 - Mamatha Maddu, Yamarthi Narasimha Rao:
Res2Net-ERNN: deep learning based cyberattack classification in software defined network. 12821-12839 - R. Shanmugapriya, S. V. N. Santhosh Kumar:
SCIDP-Secure cloud-integrated data dissemination protocol for efficient reprogramming in internet of things. 12841-12860 - Mohammad Yekta, Hadi Shahriar Shahhoseini:
SCRUB: a novel energy-efficient virtual machines selection and migration scheme in cloud data centers. 12861-12874 - Huanlong Zhang, Chenglin Guo, Jianwei Zhang, Xin Wang, Jiaxiang Zhang:
An improved Tasmanian devil optimization algorithm based on sine-cosine strategy with dynamic weighting factors. 12875-12897 - Liji Luo, Siwei Wei, Hua Tang, Chunzhi Wang:
An effective partition-based framework for virtual machine migration in cloud services. 12899-12917 - Manoj Aggarwal, Pritam Rani, Prity Rani, Pratima Sharma:
Revolutionizing agri-food supply chain management with blockchain-based traceability and navigation integration. 12919-12942 - B. Dhanalaxmi, Yeligeti Raju, B. Saritha, N. Sabitha, Namita Parati, Kandula Damodhar Rao:
OptFBFN: IOT threat mitigation in software-defined networks based on fuzzy approach. 12943-12963 - Abdelkarim Ben Sada, Amar Khelloufi, Abdenacer Naouri, Huansheng Ning, Sahraoui Dhelim:
Hybrid metaheuristics for selective inference task offloading under time and energy constraints for real-time IoT sensing systems. 12965-12981 - Nisha Pal, Dharmendra Kumar Yadav:
Modeling and verification of software evolution using bigraphical reactive system. 12983-13003 - Xiwen Qin, Siqi Zhang, Xiaogang Dong, Hongyu Shi, Liping Yuan:
Improved aquila optimizer with mRMR for feature selection of high-dimensional gene expression data. 13005-13027 - Wei Zhao, Weiming Gao, Shengnan Gao, Chenmei Teng, Xiaoya Zhu:
Quantum competitive decision algorithm for the emergency siting problem under given deadline conditions. 13029-13046 - Rashmi Keshri, Deo Prakash Vidyarthi:
Energy-efficient communication-aware VM placement in cloud datacenter using hybrid ACO-GWO. 13047-13074 - Y. Sreenivasa Rao, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath:
Designing quantum-secure attribute-based encryption. 13075-13091 - Abdelazim G. Hussien, Amit Chhabra, Fatma A. Hashim, Adrian Pop:
A novel hybrid Artificial Gorilla Troops Optimizer with Honey Badger Algorithm for solving cloud scheduling problem. 13093-13128 - Ankit Kumar Jain, Hariom Shukla, Diksha Goel:
A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks. 13129-13164 - Jun Wang, Ze Luo, Chenglong Wang:
A two-way trust routing scheme to improve security in fog computing environment. 13165-13185 - Yilin Li, Yanxian Bi, Jian Wang, Zhiqiang Li, Hongxia Zhang, Peiying Zhang:
Unmanned aerial vehicle assisted communication: applications, challenges, and future outlook. 13187-13202 - Changjun Wu, Qingzhen Li, Qiaohua Wang, Huanlong Zhang, Xiaohui Song:
A hybrid northern goshawk optimization algorithm based on cluster collaboration. 13203-13237 - Gholam Reza Zargar, Hamid Barati, Ali Barati:
An authentication mechanism based on blockchain for IoT environment. 13239-13255 - Ning Sha, Xiaochun Wu, Jinpeng Wen, Jinglei Li, Chuanhuang Li:
Adaptive spatio-temporal graph convolutional network with attention mechanism for mobile edge network traffic prediction. 13257-13272 - Debashreet Das, Sayak Sengupta, Shashank Mouli Satapathy, Deepanshu Saini:
HOGWO: a fog inspired optimized load balancing approach using hybridized grey wolf algorithm. 13273-13294 - Heming Jia, Qixian Wen, Yuhao Wang, Seyedali Mirjalili:
Catch fish optimization algorithm: a new human behavior algorithm for solving clustering problems. 13295-13332 - Yongxing Lin, Xiaoyan Xu, Hongyun Xu:
A revolutionary approach to use convolutional spiking neural networks for robust intrusion detection. 13333-13352 - Mazhar Hussain, Said Nabi, Mushtaq Hussain:
RAPTS: resource aware prioritized task scheduling technique in heterogeneous fog computing environment. 13353-13377 - Yunfa Li, Hui Li:
A novel real-time object detection method for complex road scenes based on YOLOv7-tiny. 13379-13393 - Ilhem Salah, Khaled Jouini, Cyril-Alexandre Pachon, Ouajdi Korbaa:
Connecting the dots between stance and fake news detection with blockchain, proof of reputation, and the Hoeffding bound. 13395-13405 - Mostafa Raeisi-Varzaneh, Omar Dakkak, Yousef Fazea, Mohammed Golam Kaosar:
Advanced cost-aware Max-Min workflow tasks allocation and scheduling in cloud computing systems. 13407-13419
Volume 27, Number 10, December 2024
- Gaoqiang Dong, Jia Wang, Mingjing Wang, Tingting Su:
An improved scheduling with advantage actor-critic for Storm workloads. 13421-13433 - Junnan Liu, Yifan Liu, Yongkang Ding:
Research and optimization of task scheduling algorithm based on heterogeneous multi-core processor. 13435-13453 - Sabina Priyadarshini, Tukaram Namdev Sawant, Gitanjali Bhimrao Yadav, J. Premalatha, Sanjay R. Pawar:
Enhancing security and scalability by AI/ML workload optimization in the cloud. 13455-13469 - Mohammad H. Nadimi-Shahraki, Shokooh Taghian, Danial Javaheri, Ali Safaa Sadiq, Nima Khodadadi, Seyedali Mirjalili:
MTV-SCA: multi-trial vector-based sine cosine algorithm. 13471-13515 - Jie Zhou, Runxin Zhang:
A weighted multi-view clustering via sparse graph learning. 13517-13530 - Muhammed Tmeizeh, Carlos Rodríguez-Domínguez, María Visitación Hurtado-Torres:
File chunking towards on-chain storage: a blockchain-based data preservation framework. 13531-13546 - Yi Jiang, Jin Xue, Kun Hu, Tianxiang Chen, Tong Wu:
Saver: a proactive microservice resource scheduling strategy based on STGCN. 13547-13564 - Feng Xia, Wenhao Cheng:
A survey on privacy-preserving federated learning against poisoning attacks. 13565-13582 - Yigit Çagatay Kuyu, Fahri Vatansever:
A hybrid approach of ALNS with alternative initialization and acceptance mechanisms for capacitated vehicle routing problems. 13583-13606 - Mohammad Fraiwan, Natheer Khasawneh:
Visual identification of sleep spindles in EEG waveform images using deep learning object detection (YOLOv4 vs YOLOX). 13607-13620 - Rahul Mishra, Dharavath Ramesh, Nazeeruddin Mohammad, Bhaskar Mondal:
Blockchain enabled secure pharmaceutical supply chain framework with traceability: an efficient searchable pharmachain approach. 13621-13641 - Essam H. Houssein, Mohammed R. Saad, Youcef Djenouri, Gang Hu, Abdelmgeid A. Ali, Hassan Shaban:
Metaheuristic algorithms and their applications in wireless sensor networks: review, open issues, and challenges. 13643-13673 - Pranav Shrivastava, Bashir Alam, Mansaf Alam:
An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing. 13675-13691 - Yingying Ning, Jing Li, Ming Zhu, Chuanxi Liu:
Service selection based on blockchain smart contracts in cloud-edge environment. 13693-13715 - Yahya M. Tashtoush, Moayyad Alajlouni, Firas Albalas, Omar A. Darwish:
Exploring low-level statistical features of n-grams in phishing URLs: a comparative analysis with high-level features. 13717-13736 - Nouha Arfaoui, Amel Ksibi, Nouf Abdullah Almujally, Ridha Ejbali:
Empowering e-learning approach by the use of federated edge computing. 13737-13748 - Sangeeta Sharma, Priyanka Verma, Nitesh Bharot, Amish Ranpariya, Rakesh Porika:
PULSE: Proactive uncovering of latent severe anomalous events in IIoT using LSTM-RF model. 13749-13762 - Logesh Rajendran, Virendra Singh Shekhawat:
Deep Convolutional Neural Network with a Fuzzy (DCNN-F) technique for energy and time optimized scheduling of cloud computing. 13763-13775 - Adda Boualem, Marwane Ayaida, Cyril de Runz, Hisham A. Kholidy, Hichem Sedjelmaci:
Sm-vsn-3c: a new Starlings model-based virtual sensor networks for coverage, connectivity, and data ccommunication. 13777-13793 - Xiaohui Huang, Junyang Wang, Yuan Jiang, Yuanchun Lan:
Multi-attention gated temporal graph convolution neural Network for traffic flow forecasting. 13795-13808 - Ankit Sharma, Kriti Bhushan:
A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks. 13809-13834 - Rui Zhong, Yuefeng Xu, Chao Zhang, Jun Yu:
Leveraging large language model to generate a novel metaheuristic algorithm with CRISPE framework. 13835-13869 - Kashif Mehboob Khan, Junaid Arshad, Darakhshan Saleem, Mohammed Alsadi, Shabir Ahmad, Marvi Jokhio:
TruPro: a blockchain-based decentralised prosumer electricity trading platform for electrical vehicles (EVs). 13871-13896 - Ahmad Heydariyan, Farhad Soleimanian Gharehchopogh, Mohammad Reza Ebrahimi Dishabi:
A hybrid multi-objective algorithm based on slime mould algorithm and sine cosine algorithm for overlapping community detection in social networks. 13897-13917 - Akhil Chaurasia, Alok Kumar, Udai Pratap Rao:
BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment. 13919-13944 - Shuhui Hao, Changcheng Huang, Ali Asghar Heidari, Huiling Chen, Guoxi Liang:
An improved weighted mean of vectors optimizer for multi-threshold image segmentation: case study of breast cancer. 13945-14004 - Gang Chen, Hu Sun:
Multi-strategy improved sparrow search algorithm based on first definition of ellipse and group co-evolutionary mechanism for engineering optimization problems. 14005-14035 - Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath, Sihem Mesnager:
An efficient quantum oblivious transfer protocol. 14037-14048 - Seyed Hossein Seyed Ebrahimi, Kambiz Majidzadeh, Farhad Soleimanian Gharehchopogh:
A principal label space transformation and ridge regression-based hybrid gorilla troops optimization and jellyfish search algorithm for multi-label classification. 14049-14093 - Amir Moradi, Fatemeh Rezaei:
Intelligent and efficient task caching for mobile edge computing. 14095-14112 - Maher Alharby, Ali Alssaiari, Saad Alateef, Nigel Thomas, Aad van Moorsel:
A quantitative analysis of the security of PoW-based blockchains. 14113-14130 - Sourav, Rifaqat Ali:
Lattice-based ring signcryption scheme for smart healthcare management. 14131-14148 - Arezoo Ghasemi, Amin Keshavarzi:
Energy-efficient virtual machine placement in heterogeneous cloud data centers: a clustering-enhanced multi-objective, multi-reward reinforcement learning approach. 14149-14166 - Huaiyu Guo, Donglin Zhu, Changjun Zhou, Chengye Zou:
DNA sequences design under many objective evolutionary algorithm. 14167-14183 - Boli Zheng, Yi Chen, Chaofan Wang, Ali Asghar Heidari, Lei Liu, Huiling Chen, Xiaowei Chen, Peirong Chen:
Stochastic biogeography-based learning improved RIME algorithm: application to image segmentation of lupus nephritis. 14185-14229 - Xiaoxiao Liu, Yan Zhao, Shigang Wang, Jian Wei:
G-SAM: GMM-based segment anything model for medical image classification and segmentation. 14231-14245 - Walid K. Ghamry, Suzan Shukry:
Channel estimation for RIS-aided MIMO systems in MmWave wireless communications with a few active elements. 14247-14267 - Lin-Tao Duan, Jin Wang, Hai-Ying Wang:
An energy-aware ant colony optimization strategy for virtual machine placement in cloud computing. 14269-14282 - Avuthu Avinash Reddy, Ramesh Babu Battula, Dinesh Gopalani:
Performance analysis of ML models on 5G sub-6 GHz bands: An experimental study. 14283-14294 - Behaylu Tadele Alemu, Alemu Jorgi Muhammed, Habtamu Molla Belachew, Mulatu Yirga Beyene:
A comprehensive detection and mitigation mechanism to protect SD-IoV systems against controller-targeted DDoS attacks. 14295-14313 - Essam H. Houssein, Marwa M. Emam, Narinder Singh, Nagwan M. Abdel Samee, Maali Alabdulhafith, Emre Çelik:
An improved honey badger algorithm for global optimization and multilevel thresholding segmentation: real case with brain tumor images. 14315-14364 - Essam H. Houssein, Asmaa Hammad, Nagwan M. Abdel Samee, Manal Abdullah Alohali, Abdelmgeid A. Ali:
TFCNN-BiGRU with self-attention mechanism for automatic human emotion recognition using multi-channel EEG data. 14365-14385 - Bhabani Sankar Samantray, K. Hemant Kumar Reddy:
Blockchain enabled secured, smart healthcare system for smart cities: a systematic review on architecture, technology, and service management. 14387-14415 - Bilal H. Abed-alguni, Basil M. Alzboun, Noor Aldeen Alawad:
BOC-PDO: an intrusion detection model using binary opposition cellular prairie dog optimization algorithm. 14417-14449 - Preetesh Purohit, Anuradha Purohit, Vrinda Tokekar:
Localization of try block and generation of catch block to handle exception using an improved LSTM. 14451-14468 - Chuan Li, Yanjie Zhu:
A hybrid butterfly and Newton-Raphson swarm intelligence algorithm based on opposition-based learning. 14469-14514 - Hong Huang, Yu Wang, Yue Cai, Hong Wang:
A novel approach for energy consumption management in cloud centers based on adaptive fuzzy neural systems. 14515-14538 - Feiyan Guo, Bing Tang, Ying Wang, Xiaoqing Luo:
Vehicle edge server deployment based on reinforcement learning in cloud-edge collaborative environment. 14539-14556 - Reham R. Mostafa, Fatma A. Hashim, Amit Chhabra, Ghaith Manita, Yaning Xiao:
Empowering bonobo optimizer for global optimization and cloud scheduling problem. 14557-14584 - Shabnam Bawa, Prashant Singh Rana, Rajkumar Tekchandani:
Migration of containers on the basis of load prediction with dynamic inertia weight based PSO algorithm. 14585-14609 - Mostafa Abodawood, Abeer Twakol Khalil, Hanan M. Amer, Mohamed Maher Ata:
Enhancing image encryption using chaotic maps: a multi-map approach for robust security and performance optimization. 14611-14635 - Amir Pakmehr, Andreas Aßmuth, Negar Taheri, Ali Ghaffari:
DDoS attack detection techniques in IoT networks: a survey. 14637-14668 - Zhe Wang, Shuangbai He, Guoan Li:
Secure speech-recognition data transfer in the internet of things using a power system and a tried-and-true key generation technique. 14669-14684 - Xinyi Chen, Mengjian Zhang, Ming Yang, Deguang Wang:
A multi-strategy improved beluga whale optimization algorithm for constrained engineering problems. 14685-14727 - Mazahir Hussain, Buseung Cho:
HPTCollector: high-performance telemetry collector. 14729-14744 - Essam H. Houssein, Gaber M. Mohamed, Youcef Djenouri, Yaser Maher Wazery, Ibrahim A. Ibrahim:
Nature inspired optimization algorithms for medical image segmentation: a comprehensive review. 14745-14766 - Mohamed A. Elseify, Salah Kamel, Loai Nasrat:
An improved moth flame optimization for optimal DG and battery energy storage allocation in distribution systems. 14767-14810 - Narender Reddy Kampelli, B. N. Bhandari:
A scalable and power efficient MAC protocol with adaptive TDMA for M2M communication. 14811-14834 - Arpita Srivastava, Ditipriya Sinha:
PSO-ACO-based bi-phase lightweight intrusion detection system combined with GA optimized ensemble classifiers. 14835-14890 - Jinge Shi, Yi Chen, Zhennao Cai, Ali Asghar Heidari, Huiling Chen, Qiuxiang He:
Multi-threshold image segmentation using a boosted whale optimization: case study of breast invasive ductal carcinomas. 14891-14949 - Sumit Sharma, Sarika Jain:
OntoXAI: a semantic web rule language approach for explainable artificial intelligence. 14951-14975 - Jamil Alshaqsi, Wenjia Wang, Osama Drogham, Rami S. Alkhawaldeh:
Quantitative and qualitative similarity measure for data clustering analysis. 14977-15002
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.