


default search action
Cluster Computing, Volume 27
Volume 27, Number 1, February 2024
- Devon Myers, Rami Mohawesh, Venkata Ishwarya Chellaboina, Anantha Lakshmi Sathvik, Praveen Venkatesh, Yi-Hui Ho, Hanna Henshaw, Muna Al-Hawawreh, David Berdik, Yaser Jararweh:

Foundation and large language models: fundamentals, challenges, opportunities, and social impacts. 1-26 - Kamta Nath Mishra

, Vandana Bhattacharjee, Shashwat Saket
, Shivam P. Mishra:
Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach. 27-52 - Sanna Mehraj Kak, Parul Agarwal

, M. Afshar Alam, Farheen Siddiqui
:
A hybridized approach for minimizing energy in cloud computing. 53-70 - Abdul Jabbar Saeed Tipu, Padraig Ó Conbhuí, Enda Howley:

Artificial neural networks based predictions towards the auto-tuning and optimization of parallel IO bandwidth in HPC system. 71-90 - Peng Zhou

, Longxin Lin, Zhen Zhang
, Yuhui Deng
, Tengjiao He:
GHB: a cost-effective and energy-efficient data center network structure with greater incremental scalability. 91-107 - Puneet Sharma, Manoj Kumar, Ashish Sharma

:
Machine learning based file type classifier designing in IoT cloud. 109-117 - Yuan Zhao

, Kang Chen, Zhisheng Ye, Zhiyu Xiang
, Qi Lu:
Multi-input cloud resource allocation strategy with limited buffer and virtual machine synchronization failure. 119-135 - Yunwei Jia, Keke Lu, Xia Li, Chenxiang Hao:

SRG: a clustering algorithm based on scale division and region growing. 137-157 - Maribell Sacanamboy:

Heuristic algorithm for task mapping problem in a hierarchical wireless network-on-chip architecture. 159-175 - Chunlin Li, Kun Jiang, Xinyong Li, Libin Zhang, Youlong Luo:

Single-tag and multi-tag RFID data cleaning approach in edge computing. 177-197 - Maryam Mirzapour-Moshizi, Vahid Sattari Naeini

, Amir Sabbagh Molahosseini:
Application placement in fog-cum-cloud environment based on a low latency policy-making framework. 199-217 - Ankur Jain, Chandrashekar Jatoth, G. R. Gangadharan:

Bi-level optimization of resource allocation and appliance scheduling in residential areas using a Fog of Things (FOT) framework. 219-229 - Malik Braik

:
Hybrid enhanced whale optimization algorithm for contrast and detail enhancement of color images. 231-267 - Prakhar Sharma, W. Wilfred Godfrey

, Aditya Trivedi:
When blockchain meets IoT: a comparison of the performance of communication protocols in a decentralized identity solution for IoT using blockchain. 269-284 - Lacchita Soni

, Harish Chandra
, Daya Sagar Gupta
, Ram Keval:
Quantum-resistant public-key encryption and signature schemes with smaller key sizes. 285-297 - Ali Hamdan Alenezi, Mahmoud Nazzal

, Ahmed Sawalmeh, Abdallah Khreishah
, Sihua Shao
, Muhannad Almutiry:
Machine learning regression-based RETRO-VLP for real-time and stabilized indoor positioning. 299-311 - Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán

, José Rafael Buendía Rubio, Gérôme Bovet, Gregorio Martínez Pérez:
Robust Federated Learning for execution time-based device model identification under label-flipping attack. 313-324 - Ahmed Cherif Mazari

, Nesrine Boudoukhani, Abdelhamid Djeffal:
BERT-based ensemble learning for multi-aspect hate speech detection. 325-339 - Mahfooz Alam

, Mohammad Shahid
, Suhel Mustajab
:
Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment. 341-376 - Chao Jing

, Jiaming Li:
CBLA_PM: an improved ann-based power consumption prediction algorithm for multi-type jobs on heterogeneous computing server. 377-394 - Ramraj Dangi

, Praveen Lalwani:
Harris Hawks optimization based hybrid deep learning model for efficient network slicing in 5G network. 395-409 - Xian Wu, Wenju Zhou

, Minrui Fei, Yonglu Du, Huiyu Zhou:
Banyan tree growth optimization and application. 411-441 - Rahim Sadigov, Elif Yildirim

, Büsra Kocaçinar
, Fatma Patlar Akbulut
, Cagatay Catal:
Deep learning-based user experience evaluation in distance learning. 443-455 - Qinlu He, Fan Zhang, Genqing Bian, Weiqi Zhang, Zhen Li, Zhimin Yu, Hao Feng:

File block multi-replica management technology in cloud storage. 457-476 - Liang Yang, Rong Jiang

, Xuetao Pu, Chenguang Wang, Yue Yang, Meng Wang, Lin Zhang, Feifei Tian:
An access control model based on blockchain master-sidechain collaboration. 477-497 - Prashant G. Ahire, Pramod D. Patil:

CAC-WOA: context aware clustering with whale optimization algorithm for knowledge discovery from multidimensional space in electricity application. 499-513 - Haiying Liu, Kun Wu, Kuihua Huang, Guangquan Cheng, Rui Wang

, Guohua Liu:
Optimization of large-scale UAV cluster confrontation game based on integrated evolution strategy. 515-529 - Nisha Pal, Mahendra Pratap Yadav

, Dharmendra Kumar Yadav:
Appropriate number of analogues in analogy based software effort estimation using quality datasets. 531-546 - Zaid Albataineh, Fatima Aldrweesh, Mohammad A. Alzubaidi:

COVID-19 CT-images diagnosis and severity assessment using machine learning algorithm. 547-562 - Lavanya Settipalli, G. R. Gangadharan, Sivaiah Bellamkonda

:
An extended lightweight blockchain based collaborative healthcare system for fraud prevention. 563-573 - Abdelhak Goudjil

, Mathieu Pouliquen, Eric Pigeon, Olivier Gehan:
On-line outer bounding ellipsoid algorithm for clustering of hyperplanes in the presence of bounded noise. 575-587 - Chengfeng Jian

, Zhuoyang Pan, Lukun Bao, Meiyu Zhang:
Online-learning task scheduling with GNN-RL scheduler in collaborative edge computing. 589-605 - Paluck Arora, Rajesh Mehta, Rohit Ahuja:

An adaptive medical image registration using hybridization of teaching learning-based optimization with affine and speeded up robust features with projective transformation. 607-627 - Zakaria Alomari, Mohammad Al-Oudat, Suboh Alkhushayni

:
Pricing the cloud based on multi-attribute auction mechanism. 629-654 - Ramesh Vatambeti, Srihari Varma Mantena

, K. V. D. Kiran, M. Manohar
, Chinthakunta Manjunath:
Twitter sentiment analysis on online food services based on elephant herd optimization with hybrid deep learning technique. 655-671 - Rashmi Kushwah:

A novel traffic aware reliable gateway selection in wireless mesh network. 673-687 - Bhushan Inje, Kapil Kumar Nagwanshi, Radha Krishna Rambola:

An efficient document information retrieval using hybrid global search optimization algorithm with density based clustering technique. 689-705 - Rima Grati, Faiza Loukil

, Khouloud Boukadi, Mourad Abed:
A blockchain-based framework for circular end-of-life vehicle processing. 707-720 - Shamsher Ullah

, Jiangbin Zheng, Muhammad Tanveer Hussain
, Muhammad Wasif Sardar
, Muhammad Umar Farooq
, Salabat Khan
:
An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing. 721-735 - Sofian Kassaymeh

, Mohammed Alweshah, Mohammed Azmi Al-Betar, Abdelaziz I. Hammouri, Mohammad Atwah Al-Ma'aitah:
Software effort estimation modeling and fully connected artificial neural network optimization using soft computing techniques. 737-760 - Rayees Ahamad, Kamta Nath Mishra

:
Hybrid approach for suspicious object surveillance using video clips and UAV images in cloud-IoT-based computing environment. 761-785 - Nazli Gulum Mutlu

, Serkan Altuntas:
Analyzing factors influencing the severity of occupational accidents in textile industry using decision tree algorithms. 787-825 - Mahshid Rezakhani, Nazanin Sarrafzadeh-Ghadimi, Reza Entezari-Maleki

, Leonel Sousa, Ali Movaghar:
Energy-aware QoS-based dynamic virtual machine consolidation approach based on RL and ANN. 827-843 - Mansoureh Zare, Yasser Elmi Sola

, Hesam Hasanpour:
Imperialist competitive based approach for efficient deployment of IoT services in fog computing. 845-858 - Mingliang Gao, Alireza Souri

, Mayram Zaker
, Wenzhe Zhai, Xiangyu Guo, Qilei Li
:
A comprehensive analysis for crowd counting methodologies and algorithms in Internet of Things. 859-873 - Assia Brighen, Hachem Slimani

, Abdelmounaam Rezgui, Hamamache Kheddouci:
A new distributed graph coloring algorithm for large graphs. 875-891 - Muhammad Faraz Hyder

, Tasbiha Fatima, Saadia Arshad
:
Towards adding digital forensics capabilities in software defined networking based moving target defense. 893-912 - Jiahui Ma, Jinxiang Chen, Ligang Dong, Xian Jiang:

Research on placement of distributed SDN multiple controllers based on IAVOA. 913-930 - Gunaganti Sravanthi, Nageswara Rao Moparthi

:
Dual Interactive Wasserstein Generative Adversarial Network optimized with arithmetic optimization algorithm-based job scheduling in cloud-based IoT. 931-944 - Sarah Alhozaimy, Daniel A. Menascé, Massimiliano Albanese:

Design and modeling of moving target defense in workflow-based applications. 945-958 - Poly Sil Sen, Nandini Mukherjee:

An ontology-based approach to designing a NoSQL database for semi-structured and unstructured health data. 959-976 - Hela Taktak

, Khouloud Boukadi
, Firas Zouari
, Chirine Ghedira Guegan
, Michael Mrissa
, Faïez Gargouri
:
A knowledge-driven service composition framework for wildfire prediction. 977-996 - Debadatta Naik

, Ramesh Dharavath, Lianyong Qi:
Quantum-PSO based unsupervised clustering of users in social networks using attributes. 997-1015 - Tianqi Bu, Zanyu Huang, Kairui Zhang, Yang Wang, Haobin Song, Jietong Zhou, Zhangjun Ren, Sen Liu:

Task scheduling in the internet of things: challenges, solutions, and future trends. 1017-1046 - Jasleen Kaur, Rinkle Rani, Nidhi Kalra:

Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS. 1047-1061 - Ridhima Rani

, Neeraj Kumar, Meenu Khurana:
Redundancy elimination in IoT oriented big data: a survey, schemes, open challenges and future applications. 1063-1087 - Alper Ozcan, Ahmet Kasif, Ismail Veli Sezgin, Cagatay Catal, Muhammad Sanwal

, Hasan Merdun:
Deep learning-based modelling of pyrolysis. 1089-1108 - Rong Gong

, Delun Li, Lila Hong, Ningxin Xie:
Task scheduling in cloud computing environment based on enhanced marine predator algorithm. 1109-1123 - Lei Zeng, Shadi G. Alawneh, Seyed Ali Arefifar

:
Parallel multi-GPU implementation of fast decoupled power flow solver with hybrid architecture. 1125-1136 - Huifang Li, Bing Chen, Jingwei Huang, Julio Ruben Cañizares Abreu

, Senchun Chai, Yuanqing Xia:
Mutation-driven and population grouping PRO algorithm for scheduling budget-constrained workflows in the cloud. 1137-1158
Volume 27, Number 2, April 2024
- Nitin Singha, Mahesh K. Singh:

Maximizing utility by optimal capacity division in P2P networks. 1159-1168 - Limin Xia, Xiaoyue Ding:

Human-object interaction recognition based on interactivity detection and multi-feature fusion. 1169-1183 - Saeid Alirezazadeh

, Luís A. Alexandre
:
Ordered balancing: load balancing for redundant task scheduling in robotic network cloud systems. 1185-1200 - Kemal Akyol

:
A comprehensive comparison study of traditional classifiers and deep neural networks for forest fire detection. 1201-1215 - Carlos Fernandez-Basso, M. Dolores Ruiz, María J. Martín-Bautista:

New Spark solutions for distributed frequent itemset and association rule mining algorithms. 1217-1234 - Ming Mao, Peng Yi, Lilong Hou, Wei Zhao:

A controller-based roadside unit plane architecture for software-defined internet of vehicles. 1235-1249 - Shahab Safaee, Meghdad Mirabi, Amir Masoud Rahmani, Ali Asghar Safaei:

A distributed B+Tree indexing method for processing range queries over streaming data. 1251-1274 - Maddila Suresh Kumar

, Vadlamani Nagalakshmi:
Secure transfer of robust healthcare data using blockchain-based privacy. 1275-1291 - Raseena M. Haris, Khaled M. Khan, Armstrong Nhlabatsi, Mahmoud Barhamgi:

A machine learning-based optimization approach for pre-copy live virtual machine migration. 1293-1312 - Kimia Abedpour

, Mirsaeid Hosseini Shirvani, Elmira Abedpour:
A genetic-based clustering algorithm for efficient resource allocating of IoT applications in layered fog heterogeneous platforms. 1313-1331 - Anisha Kumari, Bibhudatta Sahoo

:
ACPM: adaptive container provisioning model to mitigate serverless cold-start. 1333-1360 - Gautam Srivastava, Jerry Chun-Wei Lin

, Guo Lin:
Secure itemset hiding in smart city sensor data. 1361-1374 - Rongxin Chen, Guorong Cai, Jie Chen, Yuling Hong:

Integrated method for distributed processing of large XML data. 1375-1399 - Ming Li, Dechang Pi, Shuo Qin:

Knowledge-based multi-objective estimation of distribution algorithm for solving reliability constrained cloud workflow scheduling. 1401-1419 - Reyhane Ghafari, Najme Mansouri:

Improved Harris Hawks Optimizer with chaotic maps and opposition-based learning for task scheduling in cloud environment. 1421-1469 - Praveen Shukla

, C. Rama Krishna, Nilesh Vishwasrao Patil:
EIoT-DDoS: embedded classification approach for IoT traffic-based DDoS attacks. 1471-1490 - Haythem Bany Salameh, Mohammad Qasem Samara, Ghaleb A. Elrefae

, Ahmad F. Al-Ajlouni:
Profit-maximization spectrum sharing in opportunistic duopoly market under dynamic spectrum pricing and QoS constraints. 1491-1502 - Seyedeh Shabnam Jazaeri

, Sam Jabbehdari
, Parvaneh Asghari, Hamid Haj Seyyed Javadi:
An efficient edge caching approach for SDN-based IoT environments utilizing the moth flame clustering algorithm. 1503-1525 - Jianing Zhao, Yubiao Pan, Huizhen Zhang, Mingwei Lin

, Xin Luo, Zeshui Xu
:
InPlaceKV: in-place update scheme for SSD-based KV storage systems under update-intensive Worklaods. 1527-1540 - Liyun Zuo, Jieguang He, Yonghui Xu, Lei Zhang:

CSADE: a delay-sensitive scheduling method based on task admission and delay evaluation on edge-cloud collaboration. 1541-1558 - Shivangi Shukla

, Sankita J. Patel:
A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture. 1559-1580 - Shun Wang, Guosun Zeng:

Two-stage scheduling for a fluctuant big data stream on heterogeneous servers with multicores in a data center. 1581-1597 - Komal Pursharthi

, Dheerendra Mishra
:
A computationally efficient and randomized RLWE-based key exchange scheme. 1599-1610 - Guangyi Zhao, Simin Kou, Xuesong Yin, Guodao Zhang, Yigang Wang:

Self-supervised deep subspace clustering with entropy-norm. 1611-1623 - Ramesh Vatambeti, E. S. Phalguna Krishna, M. Ganesh Karthik

, Vijay Kumar Damera
:
Securing the medical data using enhanced privacy preserving based blockchain technology in Internet of Things. 1625-1637 - Yarasu Madhavi Latha, B. Srinivasa Rao:

Product recommendation using enhanced convolutional neural network for e-commerce platform. 1639-1653 - Shorouq Al-Eidi, Omar Darwish, Yuanzhu Chen, Majdi Maabreh

, Yahya M. Tashtoush
:
A deep learning approach for detecting covert timing channel attacks using sequential data. 1655-1665 - Hongjian Li

, Jiaxin Liu, Lankai Yang, Liangjie Liu, Hu Sun:
An improved arithmetic optimization algorithm for task offloading in mobile edge computing. 1667-1682 - Mohammadreza Ipchi Sheshgelani, Saeid Pashazadeh, Pedram Salehpoor:

Framework for wrapping binary swarm optimizers to the hybrid parallel cooperative coevolving version. 1683-1697 - Nairita Sarkar, Pankaj Kumar Keserwani, Mahesh Chandra Govil:

A better and fast cloud intrusion detection system using improved squirrel search algorithm and modified deep belief network. 1699-1718 - Keerthi Kethineni, G. Pradeepini

:
Intrusion detection in internet of things-based smart farming using hybrid deep learning framework. 1719-1732 - Selvam Durairaj

, Rajeswari Sridhar:
MOM-VMP: multi-objective mayfly optimization algorithm for VM placement supported by principal component analysis (PCA) in cloud data center. 1733-1751 - Jiaxiang Zhang, Linwei Li, Huanlong Zhang, Feng-Xian Wang, Yangyang Tian:

A novel sparrow search algorithm with integrates spawning strategy. 1753-1773 - Masoud Nematollahi, Ali Ghaffari, Abbas Mirzaei

:
Task and resource allocation in the internet of things based on an improved version of the moth-flame optimization algorithm. 1775-1797 - Dina A. Amer, Gamal Attiya, Ibrahim Ziedan:

An efficient multi-objective scheduling algorithm based on spider monkey and ant colony optimization in cloud computing. 1799-1819 - William S. Welling, Yanyan Sheng, Michelle M. Zhu:

CUDA-aware MPI implementation of Gibbs sampling for an IRT model. 1821-1830 - Jung-Woong Sung, Seung-Jae Han, Jin-Woo Kim:

Cloning-based virtual machine pre-provisioning for resource-constrained edge cloud server. 1831-1847 - Higinio Mora, Francisco A. Pujol, Tamai Ramírez

, Antonio Jimeno-Morenilla, Julian Szymanski:
Network-assisted processing of advanced IoT applications: challenges and proof-of-concept application. 1849-1865 - Xizhen Deng, Mingcan Cen

, M. Jiang, Meiqu Lu:
Ransomware early detection using deep reinforcement learning on portable executable header. 1867-1881 - Hao Xu, Chengfeng Jian:

A meta reinforcement learning-based virtual machine placement algorithm in mobile edge computing. 1883-1896 - Zhongguo Yang, Mingzhu Zhang, Han Li, Weilong Ding

:
A novel seq2seq-based prediction approach for workflow scheduling. 1897-1910 - Ali Kelkawi, Imtiaz Ahmad, Mohammed El-Abd

:
Spark-based cooperative coevolution for large scale global optimization. 1911-1926 - Sohaib Asif

, Wenhui Yi, Qurrat Ul Ain
, Yi Yueyang, Jinhai Si:
Improving the accuracy of diagnosing and predicting coronary heart disease using ensemble method and feature selection techniques. 1927-1946 - Gyan Singh

, Amit K. Chaturvedi
:
Hybrid modified particle swarm optimization with genetic algorithm (GA) based workflow scheduling in cloud-fog environment for multi-objective optimization. 1947-1964 - Slokashree Padhi, R. B. V. Subramanyam:

User request-based scheduling algorithms by managing uncertainty of renewable energy. 1965-1982 - Junfeng Tian, Ruxin Bai, Tianfeng Zhang:

Supporting dynamic update scheme for assured deletion based-multi-copy association tree. 1983-2001 - Lei Chen, Changzhou Feng, Yunpeng Ma:

Improved Harris Hawks optimization for global optimization and engineering design. 2003-2027 - Muhammad Akraam, Tabasam Rashid, Sohail Zafar:

A novel and secure image encryption scheme based on two-dimensional logistic and Arnold Cat map. 2029-2048 - Shaohua Wang, Xiaoxiong Xu:

A retrieval method of learners' behavior features based on K-means clustering algorithm. 2049-2058 - Han Yang, Jun Li:

Prototypical contrastive learning for image classification. 2059-2069 - Pablo C. Cañizares, Alberto Núñez

, Rosa Filgueira, Juan de Lara:
Parallel mutation testing for large scale systems. 2071-2097 - Duan Chen, Zhengwei Huang, Yiting Tan, Jintao Min, Ribesh Khanal

:
Emotion and sentiment analysis for intelligent customer service conversation using a multi-task ensemble framework. 2099-2115 - Ahmed Aleroud, Majd Shariah, Rami Malkawi, Samer Y. Khamaiseh, Abdullah S. Al-Alaj

:
A privacy-enhanced human activity recognition using GAN & entropy ranking of microaggregated data. 2117-2132 - Donglin Zhu, Siwei Wang, Zuwei Huang, Changjun Zhou, Lin Zhang:

A JAYA algorithm based on normal clouds for DNA sequence optimization. 2133-2149 - Abid Jamal, Muhammad Umar Javed

, Nabil Ali Alrajeh, Safdar Hussain Bouk, Nadeem Javaid:
Blockchain based reputation management, data storage and distributed revocation in vehicular energy networks in smart health care systems. 2151-2163 - Guang Yang, Lidong Han, Jingguo Bi, Fuqun Wang:

A collusion-resistant certificateless provable data possession scheme for shared data with user revocation. 2165-2179 - Sofia Strukova, José A. Ruipérez-Valiente, Félix Gómez Mármol:

Computational approaches to detect experts in distributed online communities: a case study on Reddit. 2181-2201 - Jingze Yu, Wenting Shen:

Secure cloud storage auditing with deduplication and efficient data transfer. 2203-2215 - Ahlem Abid

, Farah Jemili
, Ouajdi Korbaa
:
Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques. 2217-2238 - Bhaskar Kapoor, Bharti Nagpal:

Hybrid cuckoo finch optimisation based machine learning classifier for seizure prediction using EEG signals in IoT network. 2239-2260 - Guangwei Xing, Yanrong Guo, Xiaoxuan Chen, Hangzai Luo, Sheng Zhong:

Improving UWB ranging accuracy via multiple network model with second order motion prediction. 2261-2272 - Tamara Dancheva, Unai Alonso, Michael Barton:

Cloud benchmarking and performance analysis of an HPC application in Amazon EC2. 2273-2290 - Mohammad Hossein Ghasemian Koochaksaraei, Abolfazl Toroghi Haghighat, Mohammad Hossein Rezvani:

An efficient cloud resource exchange model based on the double auction and evolutionary game theory. 2291-2307 - Safdar Jamil, Abdul Salam

, Awais Khan, Bernd Burgstaller, Sung-Soon Park, Youngjae Kim:
Correction: Scalable NUMA-aware persistent B+-tree for non-volatile memory devices. 2309 - Retraction Note: Agricultural product monitoring system supported by cloud computing. 2311

Volume 27, Number 3, June 2024
- Yizhuo Yang, Hongjin Zeng, Tingping Chen, Meng Lv:

Design of a distributed offloading and real-time data unified access platform for IoT within command and control communication networks. 2313-2327 - ShiLong Zhao, Gang Li, Mingle Zhou, Min Li:

YOLO-CEA: a real-time industrial defect detection method based on contextual enhancement and attention. 2329-2344 - Mohit, Sanmeet Kaur

, Maninder Singh:
Design and implementation of blockchain-based supply chain framework with improved traceability, privacy, and ownership. 2345-2363 - Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, Hung Tran:

Machine learning-based intrusion detection: feature selection versus feature extraction. 2365-2379 - Damon Alsup, Mohan Putluru, Suxia Cui, Yunpeng Zhang:

Cloud security game theory scoring from predation models in simulation. 2381-2398 - Olesia Pozdniakova

, Aurimas Cholomskis, Dalius Mazeika
:
Self-adaptive autoscaling algorithm for SLA-sensitive applications running on the Kubernetes clusters. 2399-2426 - Lamis Abdo, Imtiaz Ahmad, Sa'ed Abed

:
A smart admission control and cache replacement approach in content delivery networks. 2427-2445 - Ali Siddique

, Mang I Vai, Sio-Hang Pun:
A low-cost, high-throughput neuromorphic computer for online SNN learning. 2447-2464 - Bahman Varastan, Shahram Jamali

, Reza Fotohi
:
Hardening of the Internet of Things by using an intrusion detection system based on deep learning. 2465-2488 - Hani Al-Balasmeh

, Maninder Singh, Raman Singh
:
Hilbert curves-based location privacy technique for vehicular cloud networks. 2489-2504 - Chaira Mahmoud, Sofiane Aouag, Hadda Cherroun, Bouziane Brik

, Abdelmounaam Rezgui:
A decentralized blockchain-based authentication scheme for cross-communication in IoT networks. 2505-2523 - Arslan Nedhir Malti, Mourad Hakem, Badr Benmammar:

A new hybrid multi-objective optimization algorithm for task scheduling in cloud systems. 2525-2548 - Jyothish A.

, Ashik Mathew, P. Vinod:
Effectiveness of machine learning based android malware detectors against adversarial attacks. 2549-2569 - Shuai Chang, Chunlin Li, Chunping Deng

, Youlong Luo:
Low-latency controller load balancing strategy and offloading decision generation algorithm based on lyapunov optimization in SDN mobile edge computing environment. 2571-2591 - Deepika Kumari, Pankaj Kumar

, Sunil Prajapat
:
A blockchain assisted public auditing scheme for cloud-based digital twin healthcare services. 2593-2609 - Animesh Kuity

, Sateesh Kumar Peddoju
:
pHPCe: a hybrid power conservation approach for containerized HPC environment. 2611-2634 - Amer Al-Rahayfeh, Saleh Atiewi, Muder Almiani

, Mohammad Jararweh, Miad Faezipour
:
Utilizing 3D magnetic source imaging with landmark-based features and multi-classification for Alzheimer's Disease diagnosis. 2635-2651 - Shaoyong Li, Xueshu Hong, Yao Feng:

MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile. 2653-2671 - Amir Vafid Hanafi, Ali Ghaffari, Hesam Rezaei, Aida Valipour, Bahman Arasteh

:
Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and LSTM. 2673-2690 - Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti

, Reji Thomas
, Tai-Hoon Kim:
RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things. 2691-2713 - Reyhaneh Ameri

, Mohammad Reza Meybodi:
The cellular goore game-based consensus protocol: a cognitive model for blockchain consensus. 2715-2740 - Bing Tang, Huiyuan Han, Qing Yang, Wei Xu:

Operator placement for data stream processing based on publisher/subscriber in hybrid cloud-fog-edge infrastructure. 2741-2759 - Yihong Liu, Xuchang Liu, Bo Zhang:

RetinaNet-vline: a flexible small target detection algorithm for efficient aggregation of information. 2761-2773 - Xiao Zhang:

Mixtran: an efficient and fair scheduler for mixed deep learning workloads in heterogeneous GPU environments. 2775-2784 - Hemant B. Mahajan

, K. T. V. Reddy:
Secure gene profile data processing using lightweight cryptography and blockchain. 2785-2803 - Ankita Srivastava, Narander Kumar:

An efficient firefly and honeybee based load balancing mechanism in cloud infrastructure. 2805-2827 - Biroju Papachary, Rajeev Arya, Bhasker Dappuri:

Efficient resource allocation with dynamic traffic arrivals on D2D communication for beyond 5G networks. 2829-2843 - Hajer Nabli

, Raoudha Ben Djemaa, Ikram Amous Ben Amor:
Improved clustering-based hybrid recommendation system to offer personalized cloud services. 2845-2874 - Hajer Nabli, Raoudha Ben Djemaa, Ikram Amous Ben Amor:

Correction: Improved clustering-based hybrid recommendation system to offer personalized cloud services. 2875 - Kariyappa Janani, Sriramulu Ramamoorthy:

A security framework to enhance IoT device identity and data access through blockchain consensus model. 2877-2900 - Zhanyou Ma, Miao Yan, Rong Wang, Shunzhi Wang:

Performance analysis of P2p network content delivery based on queueing model. 2901-2915 - Thanasis Moustakas

, Kostas Kolomvatsos:
Cluster based similarity extraction upon distributed datasets. 2917-2929 - Yi Wan:

The balance of utility, privacy, and trust in network services. 2931-2946 - M. Gayathri Santhosh

, T. R. Reshmi:
A novel revocation management for distributed environment: a detailed study. 2947-2958 - Gongbo Liang, Mohammed Salem Atoum

, Xin Xing, Izzat Alsmadi:
Benchmark assessment for the DeepSpeed acceleration library on image classification. 2959-2970 - Abdelaziz Mokhnache

, Lahcene Ziet, Fayçal Radjah:
Comparative analysis between a pixel-wise image encryption scheme and AES in a web application context. 2971-2982 - K. T. Jafseer, S. Shailesh, A. Sreekumar:

CPOCEDS-concept preserving online clustering for evolving data streams. 2983-2998 - D. Balakrishnan

, T. Dhiliphan Rajkumar, S. Dhanasekaran, B. S. Murugan:
Secure and energy-efficient data transmission framework for IoT-based healthcare applications using EMCQLR and EKECC. 2999-3016 - Ning Xie, Jixian Zhang

, Xuejie Zhang, Weidong Li
:
Double auction mechanisms in edge computing resource allocation for blockchain networks. 3017-3035 - Dexin Zhu

, Yu Sun, Nianfeng Li, Lijun Song, Jun Zheng:
Secure electronic medical records sharing scheme based on blockchain and quantum key. 3037-3054 - Rami Al-Jarrah

, Hitham Tlilan, Abdallah Khreishah:
Exploiting the adaptive neural fuzzy inference system for predicting the effect of notch depth on elastic new strain-concentration factor under combined loading. 3055-3073 - Xiaolong Chen

, Du Yu:
Hybrid artificial immune algorithm for energy-efficient distributed flexible job shop in semiconductor manufacturing. 3075-3098 - Ahmet Vedat Tokmak, Akhan Akbulut, Cagatay Catal:

Boosting the visibility of services in microservice architecture. 3099-3111 - Qihuan Wu, Xiaoming You, Sheng Liu:

Multi-ant colony optimization algorithm based on game strategy and hierarchical temporal memory model. 3113-3133 - Prabhjot Kaur, Nitin Kumar:

BRIEFBCS: binary robust independent elementary features based fuzzy vault scheme in BCS. 3135-3148 - Yuchen Zhang, Xiao Zhang, Jinyang Yu, Yulong Shi, Linxuan Su:

Quantification and analysis of performance fluctuation in distributed file system. 3149-3162 - Mahmoud Darwich

, Taghreed Alghamdi, Kasem Khalil, Yasser Ismail, Magdy A. Bayoumi:
Cost-optimized cloud resource management for video streaming: ARIMA predictive approach. 3163-3177 - Neha Gahlan, Divyashikha Sethia:

Federated learning inspired privacy sensitive emotion recognition based on multi-modal physiological sensors. 3179-3201 - Attia Qammar, Abdenacer Naouri, Jianguo Ding

, Huansheng Ning:
Blockchain-based optimized edge node selection and privacy preserved framework for federated learning. 3203-3218 - Ju-Won Park, Xin Huang

, Jae-Kook Lee, Taeyoung Hong:
I/O-signature-based feature analysis and classification of high-performance computing applications. 3219-3231 - Jeong-Hoon Kim, Sun-Hyun Kim, Charn-Doh Bak, Seung-Jae Han:

Adaptive cloud resource allocation for large-scale crowdsourced multimedia live streaming services. 3233-3257 - Abdullah Alsalemi, Abbes Amira, Hossein Malekmohamadi

, Kegong Diao:
Energy data classification at the edge: a comparative studyfor energy efficiency applications. 3259-3275 - Liyan Xiong, Zhuyi Hu, Xinhua Yuan, Weihua Ding, Xiaohui Huang, Yuanchun Lan:

Multi-scale attention graph convolutional recurrent network for traffic forecasting. 3277-3291 - Yuping Yan, Yutian Hong:

Design of the implementation information management platform for distributed generation in distribution network based on information integration. 3293-3305 - Rami Mohawesh, Muna Al-Hawawreh

, Sumbal Maqsood
, Omar AlQudah:
Factitious or fact? Learning textual representations for fake online review detection. 3307-3322 - Hui Xiang, Meiyu Zhang, Chengfeng Jian:

Federated deep reinforcement learning-based online task offloading and resource allocation in harsh mobile edge computing environment. 3323-3339 - Zeynep Garip, Ekin Ekinci, Murat Erhan Çimen:

A comparative study of optimization algorithms for feature selection on ML-based classification of agricultural data. 3341-3362 - Sana Aurangzeb, Muhammad Aleem

, Muhammad Taimoor Khan
, Haris Anwar, Muhammad Shaoor Siddique:
Cybersecurity for autonomous vehicles against malware attacks in smart-cities. 3363-3378 - Olfa Souki, Raoudha Ben Djemaa, Ikram Amous, Florence Sèdes:

Monitoring and analyzing as a service (MAaaS) through cloud edge based on intelligent transportation applications. 3379-3395 - Ruiwen Wang, Jihong Liu, Qiang Zhang, Chao Fu, Yongzhu Hou:

Federated learning for feature-fusion based requirement classification. 3397-3416 - Shruti Arora

, Rinkle Rani, Nitin Saxena:
SETL: a transfer learning based dynamic ensemble classifier for concept drift detection in streaming data. 3417-3432 - Alberto Cabrera, Francisco Almeida, Dagoberto Castellanos Nieves, Ariel Oleksiak, Vicente Blanco Pérez

:
Energy efficient power cap configurations through Pareto front analysis and machine learning categorization. 3433-3449 - Eduru Harindra Venkatesh, Yelleti Vivek

, Vadlamani Ravi, Shiva Shankar Orsu:
Parallel and streaming wavelet neural networks for classification and regression under apache spark. 3451-3469 - Anirudh Kasturi, Akshat Agrawal, Chittaranjan Hota:

Secure peer-to-peer learning using feature embeddings. 3471-3479 - Tao Shen, Qianqi Sun, Chi Zhang, Fenhua Bai:

SEKad: a scalable protocol for blockchain networks with enhanced broadcast efficiency. 3481-3498 - Guilherme Andrade, Willian Barreiros

, Leonardo Rocha
, Renato Ferreira, George Teodoro:
Large-scale response-aware online ANN search in dynamic datasets. 3499-3519 - Sara Amaouche, Azidine Guezzaz

, Said Benkirane, Mourade Azrour:
IDS-XGbFS: a smart intrusion detection system using XGboostwith recent feature selection for VANET safety. 3521-3535 - Avtar Singh

, Harpreet Kaur, Navjot Kaur:
A novel DDoS detection and mitigation technique using hybrid machine learning model and redirect illegitimate traffic in SDN network. 3537-3557 - Guoao Zhou, Lijuan Yu, Yixin Su, Bingrong Xu, Guoyuan Zhou:

Lightweight PCB defect detection algorithm based on MSD-YOLO. 3559-3573 - Lin Zhang, Lizhen Ji, Zongfang Ma:

Target positioning method based on B-spline level set and GC Yolo-v3. 3575-3591 - Anusha Nalajala

, Thirumalaisamy Ragunathan, Ranesh Naha
, Sudheer Kumar Battula:
Application and user-specific data prefetching and parallel read algorithms for distributed file systems. 3593-3613 - Nasraldeen Alnor Adam Khleel

, Károly Nehéz:
Software defect prediction using a bidirectional LSTM network combined with oversampling techniques. 3615-3638 - Alireza Souri, Monire Norouzi, Yousef Alsenani:

A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things. 3639-3655 - Vidyapati Jha

, Priyanka Tripathi:
Decentralized knowledge discovery using massive heterogenous data in Cognitive IoT. 3657-3682 - Mohd Akbar

, Irshad Ahmad, Mohsina Mirza, Manavver Ali, Praveen Barmavatu
:
Enhanced authentication for de-duplication of big data on cloud storage system using machine learning approach. 3683-3702 - Dong Yang, Ruyan Ren:

A method of system selection for shuttle-based storage and retrieval system considering cost and performance. 3703-3716 - Hussam N. Fakhouri

, Sadi Alawadi, Feras M. Awaysheh, Faten Hamad
:
Novel hybrid success history intelligent optimizer with Gaussian transformation: application in CNN hyperparameter tuning. 3717-3739 - Sherif Hamdy Gomaa Salem, Ashraf Yehia Hassan, Marwa S. Moustafa, Mohamed Nabil Hassan:

Blockchain-based biometric identity management. 3741-3752 - Ashish R. Chaudhari, Bhavesh N. Gohil, Udai Pratap Rao:

A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis. 3753-3769 - Farah Jemili

, Rahma Meddeb
, Ouajdi Korbaa
:
Intrusion detection based on ensemble learning for big data classification. 3771-3798 - Mohammad Ali Alizadeh, Somayyeh Jafarali Jassbi, Ahmad Khademzadeh, Majid Haghparast

:
Novel lightweight and fine-grained fast access control using RNS properties in fog computing. 3799-3817 - Somnath Chatterjee, Vaibhav Shaw, Ranit Das:

Multi-stage intrusion detection system aided by grey wolf optimization algorithm. 3819-3836 - Faquan Chen, Miaolei Deng, Hui Gao

, Xiaoya Yang, Dexian Zhang:
AP-Net: a metallic surface defect detection approach with lightweight adaptive attention and enhanced feature pyramid. 3837-3851 - Kheireddine Zaghouani, Badis Djamaa

, Ali Yachir:
DRDChain: a blockchain-based distributed resource directory for the internet of things. 3853-3874 - Chanyoung Oh, Saehanseul Yi, Jongkyu Seok, Hyeonjin Jung, Illo Yoon, Youngmin Yi:

Hybridhadoop: CPU-GPU hybrid scheduling in hadoop. 3875-3892 - Zhengtao Jiang, Kai Li, Yong Wang, Meilin Liu, Huiqiang Li:

A task allocation schema based on response time optimization in cloud computing. 3893-3910
Volume 27, Number 4, July 2024
- Brandon A. Mosqueda González

, Omar Hasan, Wisnu Uriawan, Youakim Badr, Lionel Brunie:
Secure and efficient decentralized machine learning through group-based model aggregation. 3911-3925 - Jongho Seol, Zuqiang Ke, Abhilash Kancharla

, Shital Joshi, Nohpill Park:
A non-fungible token (NFT) chain model and performance study. 3927-3944 - Shengwei You

, Kristina Radivojevic, Jarek Nabrzyski, Paul R. Brenner:
Persona preserving reputation protocol (P2RP) for enhanced security, privacy, and trust in blockchain oracles. 3945-3956 - Wenxiang Wei, Nafei Zhu, Jian Wang, Hongyu Song, Jingsha He:

A scalable blockchain storage scheme for VANET. 3957-3981 - Si Yuan Jin, Yong Xia, Bo Tong Xu:

Scalability meets regulation: UTXO-based sharding and zero-knowledge proofs for regulated digital currencies. 3983-3996 - Youssif Abuzied, Mohamed Ghanem, Fadi Dawoud, Habiba Gamal, Eslam Soliman, Hossam Sharara, Tamer A. ElBatt:

A privacy-preserving federated learning framework for blockchain networks. 3997-4014 - Md. Jobair Hossain Faruk, Fazlul Alam, Mazharul Islam, Akond Rahman

:
Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparency. 4015-4034 - Sebastian Kotstein

, Christian Decker:
RESTBERTa: a Transformer-based question answering approach for semantic search in Web API documentation. 4035-4061 - Aditi Gupta

, Sukanya Gupta, Adeiza James Onumanyi, Satyadev Ahlawat, Yamuna Prasad, Virendra Singh:
A-TSPD: autonomous-two stage algorithm for robust peak detection in online time series. 4063-4076 - Robin Lichtenthäler

, Guido Wirtz
:
Formulating a quality model for cloud-native software architectures: conceptual and methodological considerations. 4077-4093 - Yashwant Singh Patel, Paul Townend, Anil Singh

, Per-Olov Östberg:
Modeling the Green Cloud Continuum: integrating energy considerations into Cloud-Edge models. 4095-4125 - Nithya Chidambaram

, Karuppusamy Thenmozhi
, Pethuru Raj, Rengarajan Amirtharajan
:
DNA-chaos governed cryptosystem for cloud-based medical image repository. 4127-4144 - Tomás Cerný, Amr S. Abdelfattah, Jorge Yero, Davide Taibi:

From static code analysis to visual models of microservice architecture. 4145-4170 - Md Showkat Hossain Chy, Korn Sooksatra, Jorge Yero, Tomás Cerný:

Benchmarking Micro2Micro transformation: an approach with GNN and VAE. 4171-4185 - Ako Muhammad Abdullah:

Energy-efficient aware and predicting bandwidth estimation routing protocol for hybrid communication in wireless body area networks. 4187-4206 - Rekha, Ritu Garg:

K-LionER: meta-heuristic approach for energy efficient cluster based routing for WSN-assisted IoT networks. 4207-4221 - Tarik Zakaria Benmerar, Theodoros Theodoropoulos, Diogo Fevereiro, Luís Rosa, João Rodrigues, Tarik Taleb

, Paolo Barone, Giovanni Giuliani, Konstantinos Tserpes, Luís Cordeiro:
Towards establishing intelligent multi-domain edge orchestration for highly distributed immersive services: a virtual touring use case. 4223-4253 - Thiago Pereira da Silva, Thaís Vasconcelos Batista, Flávia Coimbra Delicato, Paulo de Figueiredo Pires:

An online ensemble method for auto-scaling NFV-based applications in the edge. 4255-4279 - Zari Shamsa, Ali Rezaee, Sahar Adabi, Ali Movaghar-Rahimabadi, Amir Masoud Rahmani:

A distributed load balancing method for IoT/Fog/Cloud environments with volatile resource support. 4281-4320 - Durgabati Podder, Subhrajyoti Deb

, Debapriya Banik, Nirmalya Kar
, Aditya Kumar Sahu:
Robust medical and color image cryptosystem using array index and chaotic S-box. 4321-4346 - Hesham AlMansouri, Zaid Hussain:

Shortest node-to-node disjoint paths algorithm for symmetric networks. 4347-4360 - Lisheng Sun, Yongjie Ma, Yuhua Pan, Minghao Wang:

Refining differential evolution with mutation rate and neighborhood weight local search. 4361-4384 - Komeil Moghaddasi

, Mohammad Masdari:
Blockchain-driven optimization of IoT in mobile edge computing environment with deep reinforcement learning and multi-criteria decision-making techniques. 4385-4413 - Liang Zeng

, Junyang Shi, Ming Li, Shanshan Wang:
Sine Cosine Embedded Squirrel Search Algorithm for Global Optimization and Engineering Design. 4415-4448 - Ali Seyfollahi, Md Mainuddin, Tania Taami, Ali Ghaffari:

RM-RPL: reliable mobility management framework for RPL-based IoT systems. 4449-4468 - M. I. Thariq Hussan

, G. Vinoda Reddy, P. T. Anitha, A. Kanagaraj, P. Naresh:
DDoS attack detection in IoT environment using optimized Elman recurrent neural networks based on chaotic bacterial colony optimization. 4469-4490 - Javad Dogani

, Ali Yazdanpanah, Arash Zare, Farshad Khunjush:
A two-tier multi-objective service placement in container-based fog-cloud computing platforms. 4491-4514 - Mohammad Hadian, Seyed Hossein Erfani, Mahmood Deypir, Meghdad Mirabi:

CD-TMS: a combinatorial design-based token management system to enhance security and performance in blockchain. 4515-4536 - Marzieh Sadat Zahedinia

, Mohammad Reza Khayyambashi, Ali Bohlooli:
IoT data management for caching performance improvement in NDN. 4537-4550 - Saleh Atiewi, Amer Al-Rahayfeh, Muder Almiani

, Abdullah Abuhussein, Salman Yussof:
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks. 4551-4568 - Birglang Bargayary

, Nabajyoti Medhi:
Preserving flow table integrity in OpenFlow networks through smart contract. 4569-4588 - Nidhi Kumari, Prasanta K. Jana:

A metaheuristic-based task offloading scheme with a trade-off between delay and resource utilization in IoT platform. 4589-4603 - Zhengfeng Li, Changchun Zhao, Guohui Zhang, Donglin Zhu, Lujun Cui:

Multi-strategy improved sparrow search algorithm for job shop scheduling problem. 4605-4619 - Mohammed Maray

, Sahibzada Muhammad Rizwan, Ehzaz Mustafa, Junaid Shuja
:
Microservices enabled bidirectional fault-tolerance scheme for healthcare internet of things. 4621-4633 - Husni Abed, Omar Al-Zoubi, Hashem Alayan, Mohammad Alshboul

:
Towards maintaining confidentiality and anonymity in secure blockchain-based e-voting. 4635-4657 - Sahul Goyal

, Lalit Kumar Awasthi:
An energy-efficient black widow-based adaptive VM placement approach for cloud computing. 4659-4672 - Smruti Rekha Swain, Anshu Parashar, Ashutosh Kumar Singh, Chung-Nan Lee:

Efficient straggler task management in cloud environment using stochastic gradient descent with momentum learning-driven neural networks. 4673-4685 - José Manuel Ruiz Ródenas, Javier Pastor-Galindo

, Félix Gómez Mármol
:
A general and modular framework for dark web analysis. 4687-4703 - Laya Mohammadi

, Vahid Khajehvand
:
Energy consumption optimization through an intelligent task offloading prediction mechanism in vehicular fog networks. 4705-4723 - Partha Sarathi Chakraborty, Omkar Santosh Gavhane, Somanath Tripathy:

SEVCOD: secure and efficient verifiable computation on outsourced data. 4725-4739 - Xiaoyan Zhao, Conghui Zhang, Shaopeng Guan

:
A data lake-based security transmission and storage scheme for streaming big data. 4741-4755 - Changyu Duan, Rong Jiang, Yi Zhang, Bin Wu, Fengliang Li, Yu Duan:

Distributed medical data storage model based on blockchain technology. 4757-4777 - Mustafa Daraghmeh

, Anjali Agarwal, Yaser Jararweh:
An ensemble clustering approach for modeling hidden categorization perspectives for cloud workloads. 4779-4803 - Jiechao Liang, Weiwei Lin, Yangguang Xu, Yubin Liu, Ruichao Mo, Xiaoxuan Luo:

Energy-aware parameter tuning for mixed workloads in cloud server. 4805-4821 - Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti

:
Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities. 4823-4839 - Yuchen Zhang, Xiao Zhang, Yulong Shi, Zhijie Huang:

Sg: Automated tuning algorithm for storage systems based on simulated environments and group climbing. 4841-4853 - Jie Luo, Zhengshuai Yin, Linqiu Gui

:
A GNSS UWB tight coupling and IMU ESKF algorithm for indoor and outdoor mixed scenario. 4855-4865 - Uddeshaya Kumar, Manish Garg

, Gautam Kaushik:
Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication. 4867-4881 - Taha Abdelazziz Rahmani

, Ghalem Belalem
, Sidi Ahmed Mahmoudi, Omar Rafik Merad Boudia:
Machine learning-driven energy-efficient load balancing for real-time heterogeneous systems. 4883-4908 - Mohammad Osmanpoor, Alireza Shameli-Sendi, Fateme Faraji Daneshgar:

Convergence of the Harris hawks optimization algorithm and fuzzy system for cloud-based task scheduling enhancement. 4909-4923 - Sanjay Roka

, Manoj Diwakar:
DSLSTM: a deep convolutional encoder-decoder architecture for abnormality detection in video surveillance. 4925-4940 - Walid K. Ghamry, Suzan Shukry:

Multi-objective intelligent clustering routing schema for internet of things enabled wireless sensor networks using deep reinforcement learning. 4941-4961 - Gurjot Singh

, Prajit Sengupta
, Anant Mehta, Jatin Bedi:
A feature extraction and time warping based neural expansion architecture for cloud resource usage forecasting. 4963-4982 - Zeyneb Chafai, Hassina Nacer

, Ouiza Lekadir, Nawel Gharbi, Linda Ouchaou:
A performance evaluation model for users' satisfaction in federated clouds. 4983-5004 - D. Adhimuga Sivasakthi, A. Sathiyaraj

, Ramkumar Devendiran
:
HybridRobustNet: enhancing detection of hybrid attacks in IoT networks through advanced learning approach. 5005-5019 - Bo Zhang, Yanyan Xu, Yuejing Yan, Zhiheng Wang:

Privacy-preserving image retrieval based on additive secret sharing in cloud environment. 5021-5045 - Bilal Abu-Salih

, Salihah Alotaibi, Ruba Abukhurma
, Muder Almiani
, Mohammed Aljaafari:
DAO-LGBM: dual annealing optimization with light gradient boosting machine for advocates prediction in online customer engagement. 5047-5073 - Nidhi, Jyoti Grover:

Federated learning analysis for vehicular traffic flow prediction: evaluation of learning algorithms and aggregation approaches. 5075-5091 - Jung-Woong Sung, Seung-Jae Han:

Use of edge resources for DNN model maintenance in 5G IoT networks. 5093-5105 - Yassin Farhat, Asma Atig, Ali Zribi, Ridha Ben Abdennour:

Neural emulator for nonlinear systems based on PSO algorithm: real-time validation. 5107-5119 - Mohammad Mohammadi, Amin Mehranzadeh

, Mohsen Chekin:
F-EVM: improving routing in Internet of Things using fuzzy MAIRCA approach and fuzzy eigenvector method. 5121-5141 - Mehrin Rouhifar, Alireza Hedayati, Vahe Aghazarian:

DITRA: an efficient event-driven multi-objective optimization algorithm for bandwidth allocation in IoT environments. 5143-5163 - Mehdi Seydali, Farshad Khunjush, Javad Dogani

:
Streaming traffic classification: a hybrid deep learning and big data approach. 5165-5193 - Numan Shafi

, Muhammad Abdullah
, Waheed Iqbal, Abdelkarim Erradi, Faisal Bukhari:
Cdascaler: a cost-effective dynamic autoscaling approach for containerized microservices. 5195-5215 - Vijaita Kashyap, Rakesh Ahuja, Ashok Kumar:

A hybrid approach for fault-tolerance aware load balancing in fog computing. 5217-5233 - Benyamin Abdollahzadeh, Nima Khodadadi

, Saeid Barshandeh
, Pavel Trojovský, Farhad Soleimanian Gharehchopogh, El-Sayed M. El-Kenawy, Laith Abualigah, Seyedali Mirjalili
:
Puma optimizer (PO): a novel metaheuristic optimization algorithm and its application in machine learning. 5235-5283 - Masoum Farahmandian, Mehdi Farrokhbakht Foumani, Peyman Bayat:

Improving fault tolerance in LinuX container-based distributed systems using blockchain. 5285-5294 - Anurag Choubey, Abhishek Sikarwar, Shreya Asoba, Rajiv Misra:

Towards an IPFS-based highly scalable blockchain for PEV charging and achieve near super-stability in a V2V environment. 5295-5336 - Slokashree Padhi, R. B. V. Subramanyam:

Uncertainty Level-Based Algorithms by Managing Renewable Energy for Geo-Distributed Datacenters. 5337-5354 - Muhammad Hussain, Nadeem Iqbal

, Zia Bashir
:
Image pixels swapping encryption based on the TetraVex game and a publicly hash-sharing algorithm. 5355-5376 - Havva Gülay Gürbüz, Bedir Tekinerdogan

, Cagatay Catal, Nagehan Pala Er:
Test suite assessment of safety-critical systems using safety tactics and fault-based mutation testing. 5377-5401 - Akashdeep Kaur, Sharad Saxena, Rajesh Kumar:

OsCoMIT: Osmotic computing-based service management for intelligent transportation systems in 5G network. 5403-5421 - Jiawen Deng, Jihui Zhang, Shengxiang Yang:

Optimizing electric vehicle routing with nonlinear charging and time windows using improved differential evolution algorithm. 5423-5458 - Manikandan Nanjappan, Pradeep Krishnadoss, Gobalakrishnan Natesan, A. Samydurai

, G. Premalatha
:
DeepLG SecNet: utilizing deep LSTM and GRU with secure network for enhanced intrusion detection in IoT environments. 5459-5471 - Helen D. Karatza

, Georgios L. Stavrinides:
Resource allocation and aging priority-based scheduling of linear workflow applications with transient failures and selective imprecise computations. 5473-5488
Volume 27, Number 5, August 2024
- Zahra Shojaee Rad, Mostafa Ghobaei-Arani

, Reza Ahsan:
Memory orchestration mechanisms in serverless computing: a taxonomy, review and future directions. 5489-5515 - Ajay Nain

, Sophiya Sheikh, Mohammad Shahid, Rohit Malik
:
Resource optimization in edge and SDN-based edge computing: a comprehensive study. 5517-5545 - Iqra Sadia Rao

, Miss Laiha Mat Kiah, M. Muzaffar Hameed, Zain Anwer Memon:
Scalability of blockchain: a comprehensive review and future research direction. 5547-5570 - Mohsen Ghorbian

, Mostafa Ghobaei-Arani
, Leila Esmaeili:
A survey on the scheduling mechanisms in serverless computing: a taxonomy, challenges, and trends. 5571-5610 - Ankush Manocha, Sandeep Kumar Sood, Munish Bhatia:

Edge intelligence-assisted smart healthcare solution for health pandemic: a federated environment approach. 5611-5630 - Hammadi Bennoui, Soumia Mancer:

CBPNs: coloured behavioural petri nets for model-based diagnosis. 5631-5646 - Marzieh Ranjbar Pirbasti, Olivia Das:

Ovcosim: an open-source versatile computation offloading simulator for cloud and fog computing. 5647-5661 - Jing Song, Jinyong Chang:

General construction of compressive integrity auditing protocol from strong homomorphic encryption scheme. 5663-5675 - Nafei Zhu, Yue Yang, Weidong Du, Yu Gan, Jingsha He:

Toward designing highly effective and efficient consensus mechanisms for blockchain-based applications. 5677-5698 - Sheetal Garg, Rohit Ahuja, Raman Singh

, Ivan Perl:
An effective deep learning architecture leveraging BIRCH clustering for resource usage prediction of heterogeneous machines in cloud data center. 5699-5719 - Vaibhav Tiwari, Chandrasen Pandey

, Diptendu Sinha Roy:
A forecasting-based approach for optimal deployment of edge servers in 5G networks. 5721-5739 - Rachid EL Mokadem, Yann Ben Maissa, Zineb El Akkaoui:

eXtreme Federated Learning (XFL): a layer-wise approach. 5741-5754 - Gunaganti Sravanthi, Nageswara Rao Moparthi

:
An efficient IoT based crop disease prediction and crop recommendation for precision agriculture. 5755-5782 - Ardalan Ghasemzadeh, Hadi S. Aghdasi, Saeed Saeedvand:

Edge server placement and allocation optimization: a tradeoff for enhanced performance. 5783-5797 - Jamil Al-Sawwa, Mohammad Almseidin, Mouhammd Alkasassbeh, Khalid Alemerien

, Remah Younisse
:
Spark-based multi-verse optimizer as wrapper features selection algorithm for phishing attack challenge. 5799-5814 - Hamid Hadian, Mohsen Sharifi

:
GT-scheduler: a hybrid graph-partitioning and tabu-search based task scheduler for distributed data stream processing systems. 5815-5832 - Songrun Yang, Jinyong Chang:

Identity-based remote data integrity auditing from lattices for secure cloud storage. 5833-5844 - Ameni Hedhli, Haithem Mezni, Lamjed Ben Said:

BPaaS placement over optimum cloud availability zones. 5845-5865 - Lhoussaine Daoudi, Mohamed Baslam, Mohamed Zagour, Saïd Safi:

5 G and beyond wireless network optimization through RIS technology: a pricing game. 5867-5877 - Binghui Qie, Xun Weng, Zhiwei Sun, Minyu Jin, Runfeng Yu:

Location-routing and cost-sharing models under joint distribution. 5879-5891 - Mohsen Khani, Shahram Jamali, Mohammad Karim Sohrabi:

Three-layer data center-based intelligent slice admission control algorithm for C-RAN using approximate reinforcement learning. 5893-5911 - NarasimhaSwamy Biyyapu, Esther Jyothi Veerapaneni

, Surapaneni Phani Praveen, Sai Srinivas Vellela
, Ramesh Vatambeti:
Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection. 5913-5931 - Ningkang Pan, Li Lv, Renbin Xiao, Hui Wang, Zhihua Cui:

A large-scale multi-objective firefly algorithm based on reward and punishment mechanisms and adaptive dimensional reorganization. 5933-5951 - Shahnawaz Ahmad

, Shabana Mehfuz, Shabana Urooj, Najah Alsubaie:
Machine learning-based intelligent security framework for secure cloud key management. 5953-5979 - Jiadong Dong, Lin Chen, Chunxiang Zheng, Kai Pan, Qinghu Guo, Shunfeng Wu, Zhaoxiang Wang:

A hierarchical optimization approach for industrial task offloading and resource allocation in edge computing systems. 5981-5993 - Nilesh J. Uke, Sharayu A. Lokhande

, Preeti Kale, Shilpa Devram Pawar
, Aparna A. Junnarkar, Sulbha Yadav
, Swapna Bhavsar, Hemant B. Mahajan
:
Distributed privacy preservation for online social network using flexible clustering and whale optimization algorithm. 5995-6012 - Sujoy Roy

, Jeet Agrawal, Alok Kumar
, Udai Pratap Rao:
Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing. 6013-6038 - Ruchika Malhotra, Anjali Bansal

, Marouane Kessentini:
Deployment and performance monitoring of docker based federated learning framework for software defect prediction. 6039-6057 - Francisco Airton Silva, Iure Fé, Francisco Silva, Tuan Anh Nguyen:

Quantifying the impact of resource redundancy on smart city system dependability: a model-driven approach. 6059-6079 - Juan M. Orduña, Carlos Pérez:

Using a nested virtualization tool for teaching VPN fundamentals. 6081-6095 - Abdellah Amzil, Mohamed Abid, Mohamed Hanini, Abdellah Zaaloul, Said El Kafhali:

Stochastic analysis of fog computing and machine learning for scalable low-latency healthcare monitoring. 6097-6117 - Qinlu He, Fan Zhang, Genqing Bian, Weiqi Zhang, Zhen Li:

Design and realization of hybrid resource management system for heterogeneous cluster. 6119-6144 - Ammar Kamal Abasi, Moayad Aloqaily, Mohsen Guizani:

Bare-bones based honey badger algorithm of CNN for Sleep Apnea detection. 6145-6165 - Kishu Gupta

, Deepika Saxena
, Rishabh Gupta, Ashutosh Kumar Singh:
MAIDS: malicious agent identification-based data security model for cloud environments. 6167-6184 - Minzhi Xu, Weidong Li

, Xuejie Zhang, Qian Su:
A discrete dwarf mongoose optimization algorithm to solve task assignment problems on smart farms. 6185-6204 - Vijay Kumar Yadav, Pushpa, Khushi Dabas, Shobhita Khatri, Vanshika Sehrawat:

Circulation of legitimate information over VANETs using threshold signature scheme. 6205-6221 - Paluck Arora, Rajesh Mehta, Rohit Ahuja:

An integration of meta-heuristic approach utilizing kernel principal component analysis for multimodal medical image registration. 6223-6246 - Bing Tang, Yuqiang Xiao, Li Zhang, Buqing Cao, Mingdong Tang, Qing Yang:

AFL-HCS: asynchronous federated learning based on heterogeneous edge client selection. 6247-6264 - Ramandeep Sandhu, Mohammad Faiz

, Harpreet Kaur, Ashish Srivastava
, Vipul Narayan:
Enhancement in performance of cloud computing task scheduling using optimization strategies. 6265-6288 - Nabila Azeri, Ouided Hioual, Ouassila Hioual:

A distributed intelligence framework for enhancing resilience and data privacy in dynamic cyber-physical systems. 6289-6304 - Renu Sharma, Anil Sharma:

Iot interoperability framework for smart home: MDA-inspired approach. 6305-6322 - Kyle Klenk, Raymond J. Spiteri

:
Improving resource utilization and fault tolerance in large simulations via actors. 6323-6340 - Haotian Luo, Niansong Mei, Chong Du:

EMR sharing system with lightweight searchable encryption and rights management. 6341-6353 - Mahmoud Darwich

, Magdy A. Bayoumi:
Video quality adaptation using CNN and RNN models for cost-effective and scalable video streaming Services. 6355-6375 - Anil Kumar Yamarthy

, Ch. Koteswara Rao
:
MDepthNet based phishing attack detection using integrated deep learning methodologies for cyber security enhancement. 6377-6395 - Praveen Shukla

, C. Rama Krishna, Nilesh Vishwasrao Patil:
SDDA-IoT: storm-based distributed detection approach for IoT network traffic-based DDoS attacks. 6397-6424 - Chang Zhang, Tao Zhu

, Hangxing Wu, Huansheng Ning:
PerMl-Fed: enabling personalized multi-level federated learning within heterogenous IoT environments for activity recognition. 6425-6440 - Mengjian Zhang

, Guihua Wen:
Duck swarm algorithm: theory, numerical optimization, and applications. 6441-6469 - Behzad Saemi, Fatemeh Halataei, Rouhollah Ahmadi, Ali A. R. Hosseinabadi, Seyed Saeid Mirkamali, Ali Asghar Rahmani Hosseinabadi:

Improving the quality of real-time data transmission service in VANETS by balancing the load on road side units. 6471-6487 - Behzad Saemi

, Fatemeh Halataei, Rouhollah Ahmadi, Ali A. R. Hosseinabadi, Seyed Saeid Mirkamali, Ali Asghar Rahmani Hosseinabadi:
Correction: Improving the quality of real-time data transmission service in VANETS by balancing the load on road side units. 6489 - Nenavath Chander, Mummadi Upendra Kumar:

Enhanced pelican optimization algorithm with ensemble-based anomaly detection in industrial internet of things environment. 6491-6509 - Qianye Ren, Bin Zhuge, Zitian Zhang, Ligang Dong, Xian Jiang:

Improved sparrow algorithm based virtual machine placement. 6511-6525 - Saroj Kumar Sahoo, Apu Kumar Saha, Essam H. Houssein, M. Premkumar, Salpa Reang, Marwa M. Emam:

An arithmetic and geometric mean-based multi-objective moth-flame optimization algorithm. 6527-6561 - Gaofeng Zhang, Xiang Li, Liqiang Xu, Ensheng Liu, Liping Zheng, Wenming Wu, Benzhu Xu:

UGV-awareness task placement in edge-cloud based urban intelligent video systems. 6563-6577 - Kaouther Gasmi, Salam Hasnaoui:

Dataflow-based automatic parallelization of MATLAB/Simulink models for fitting modern multicore architectures. 6579-6590 - Liyan Xiong, Yijuan Zeng, Xiaohui Huang, Zhida Li, Peng Huang:

MLANet: multi-level attention network with multi-scale feature fusion for crowd counting. 6591-6608 - Gyanapriya Pradhan, Madhukrishna Priyadarsini

:
A trusted computing framework for cloud data security using role-based access and pattern recognition. 6609-6622 - Chao Yang, Hong Yang, Donglin Zhu, YiWen Hu, Yu Zhang, HongYuan Ma, Di Zhang:

A multi-mechanism balanced advanced learning sparrow search algorithm for UAV path planning. 6623-6666 - Ankita Choudhary

, Meenu Chawla
, Namita Tiwari:
A blockchain-based framework for Academic Bank of Credit with transparent credit mobility. 6667-6688 - Zhiying Peng, Yixue Yang, Hao Zhao:

Multi-level spatial-temporal fusion neural network for traffic flow prediction. 6689-6702 - Shivankur Thapliyal

, Narender Kumar
:
Hyperbolic Sine Optimizer: a new metaheuristic algorithm for high performance computing to address computationally intensive tasks. 6703-6772 - Jiayang Xu, Xiaohui Huang, Ge Song, Zu Gong:

A coupled generative graph convolution network by capturing dynamic relationship of regional flow for traffic prediction. 6773-6786 - Zihan Chen, Haijiang Zhu, Yutong Liu

, Xiaoyu Gao:
MSCA-UNet: multi-scale channel attention-based UNet for segmentation of medical ultrasound images. 6787-6804 - Piotr Porwik, Krzysztof Wrobel, Tomasz Orczyk, Rafal Doroz:

FBDD: feature-based drift detector for batch processing data. 6805-6822 - Faten Louati, Farah Barika Ktata

, Ikram Amous:
Big-IDS: a decentralized multi agent reinforcement learning approach for distributed intrusion detection in big data networks. 6823-6841 - Reyhaneh Ameri

, Mohammad Reza Meybodi:
An improved cellular goore game-based consensus protocol for blockchain. 6843-6868 - Jingyuan Wang, Tianhai Zhao, Yunlan Wang:

Network states-aware collective communication optimization. 6869-6887 - Vidyapati Jha

, Priyanka Tripathi:
Decentralized multiple hypothesis testing in Cognitive IOT using massive heterogeneous data. 6889-6929 - Mohammed W. Elbes, Shadi AlZu'bi, Tarek Kanan, Ala Mughaid

, Samia A. Abu-Shanab:
Big dermatological data service for precise and immediate diagnosis by utilizing pre-trained learning models. 6931-6951 - Der-Chen Huang, Ling-Chun Liu, Yong-Yuan Deng, Chin-Ling Chen, Kuang-Wei Zeng:

A hyperledger fabric-based EMR sharing mechanisms with proxy re-encryption and IPFS. 6953-6983 - Anjali Choudhary

, Ranjit Rajak:
A novel strategy for deterministic workflow scheduling with load balancing using modified min-min heuristic in cloud computing environment. 6985-7006 - Chang Xu, Hongzhou Rao, Liehuang Zhu, Chuan Zhang, Kashif Sharif

:
EPVM: efficient and publicly verifiable computation for matrix multiplication with privacy preservation. 7007-7022 - Sumit, Rajender Singh Chhillar, Sandeep Dalal, Surjeet Dalal

, Umesh Kumar Lilhore
, Sarita Samiya:
A dynamic and optimized routing approach for VANET communication in smart cities to secure intelligent transportation system via a chaotic multi-verse optimization algorithm. 7023-7048 - Yechuan Lin, Shixing Liu:

The integration strategy of information system based on artificial intelligence big data technology in metaverse environment. 7049-7057
Volume 27, Number 6, September 2024
- Parijata Majumdar, Sanjoy Mitra:

Blockchain technology for society 4.0: a comprehensive review of key applications, requirement analysis, research trends, challenges and future avenues. 7059-7081 - Aya H. Allam, Ibrahim Gomaa, Hala H. Zayed, Mohamed Taha:

IoT-based eHealth using blockchain technology: a survey. 7083-7110 - Anil Elakas, Hasan Sözer, Ilgin Safak, Kübra Kalkan:

A systematic mapping on software testing for blockchains. 7111-7126 - Kanishk Dwivedi, Majid Haghparast

, Tommi Mikkonen:
Quantum software engineering and quantum software development lifecycle: a survey. 7127-7145 - Hao Cui, Yaning Xiao

, Abdelazim G. Hussien
, Yanling Guo:
Multi-strategy boosted Aquila optimizer for function optimization and engineering design problems. 7147-7198 - Wei Yang, Yao Shan, Jiaxuan Wang, Yu Yao:

An industrial network intrusion detection algorithm based on IGWO-GRU. 7199-7217 - Yawar Abbas Bangash, Waseem Iqbal, Shynar Mussiraliyeva, Saddaf Rubab

, Bilal Rauf:
Reliability through an optimal SDS controller's placement in a SDDC and smart city. 7219-7240 - Junnan Liu, Yongkang Ding, Yifan Liu:

A balanced leader election algorithm based on replica distribution in Kubernetes cluster. 7241-7250 - Yongjun Xiao, Daria K. Voronkova:

A new energy-aware technique to improve the network lifetime of wireless Internet of Things using a most valuable player algorithm. 7251-7271 - Mouaad Mohy-Eddine

, Azidine Guezzaz
, Said Benkirane, Mourade Azrour:
Malicious detection model with artificial neural network in IoT-based smart farming security. 7307-7322 - Keyvan Ahani, Sepideh Adabi, Parvaneh Asghari:

A real-time stable competitive auction-based task offloading market for heterogeneous mobile cloud (HMC). 7323-7349 - Hadeer S. Hossam, Hala Abdel-Galil, Mohamed Belal:

An energy-aware module placement strategy in fog-based healthcare monitoring systems. 7351-7372 - Tarek Hagras, Gamal A. El-Sayed:

Maintaining the completion-time mechanism for Greening tasks scheduling on DVFS-enabled computing platforms. 7373-7388 - Jatinder Kumar, Ashutosh Kumar Singh:

A secure paillier cryptosystem based privacy-preserving data aggregation and query processing models for smart grid. 7389-7400 - Chengang Dong

, Yuhao Tang, Liyan Zhang:
GHA-Inst: a real-time instance segmentation model utilizing YOLO detection framework. 7401-7415 - Antonio Nicolas-Plata, José Luis González Compeán

, Víctor Jesús Sosa Sosa:
A service mesh approach to integrate processing patterns into microservices applications. 7417-7438 - Yongxuan Sang, Jiangpo Wei, Zhifeng Zhang, Bo Wang:

A mobility-aware task scheduling by hybrid PSO and GA for mobile edge computing. 7439-7454 - Biroju Papachary, Rajeev Arya, Bhasker Dappuri:

Power-aware QoS-centric strategy for ultra reliable low latency communication in 5G beyond wireless networks. 7455-7468 - Alireza Froozani Fard, Mohammad Reza Mollahoseini Ardakani

, Kamal Mirzaie:
Multi-objective task offloading optimization in fog computing environment using INSCSA algorithm. 7469-7491 - Rasheed Ahmad, Izzat Alsmadi:

Data fusion and network intrusion detection systems. 7493-7519 - Arash Heidari

, Houshang Shishehlou, Mehdi Darbandi, Nima Jafari Navimipour, Senay Yalçin:
A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree. 7521-7539 - Oussama Aiadi, Belal Khaldi

, Aicha Korichi, Mourad Chaa, Mohamed Ben Bezziane, Ibrahim Omara
:
Fusion of deep and local gradient-based features for multimodal finger knuckle print identification. 7541-7557 - Davoud Mostafavi Amjad, Behdis Eslamnour:

Locality-aware virtual machine placement based on similarity properties in mobile edge computing. 7559-7580 - Yu Peng, Jia Hao

, Yang Chen, Jianhou Gan:
Fine-grained resource adjustment of edge server in cloud-edge collaborative environment. 7581-7598 - Nguyen Tan Cam

, Nguyen Ngoc Man:
Uit-DGAdetector: detect domains generated by algorithms using machine learning. 7599-7619 - Nitin Thapliyal, Priti Dimri:

Task scheduling using fuzzy logic with best-fit-decreasing for cloud computing environment. 7621-7636 - Mohammad Al-Khaddour, Majdeddin Ali, Mazen Youssef

:
Line-of-sight aware accurate collaborative localization based on joint TDoA and AoA measurements in UWB-MIMO environment. 7637-7655 - Xi-Wei Yang, Xiao-Chun Wu, Yue Shao, Gan Tang:

Energy-delay-aware VNF scheduling: a reinforcement learning approach with hierarchical reward enhancement. 7657-7671 - Danyal Shahmirzadi

, Navid Khaledian
, Amir Masoud Rahmani:
Analyzing the impact of various parameters on job scheduling in the Google cluster dataset. 7673-7687 - Meeniga Vijaya Lakshmi, Ambidi Naveena, Maddala Vijayalakshmi:

An adaptive vulture based deep belief mechanism for searching user's resources in mobile P2P environment. 7689-7704 - Guokai Wu, Huabin Wang, Weiwei Lin, Ruichao Mo, Xiaoxuan Luo:

FS-DBoost: cross-server energy efficiency and performance prediction in cloud based on transfer regression. 7705-7719 - Mohammed M. Msallam

, Syahril Anuar Bin Idris:
Unsupervised text feature selection by binary fire hawk optimizer for text clustering. 7721-7740 - Dexin Zhu

, Hu Zhou, Nianfeng Li, Lijun Song, Jun Zheng:
Multi-factor authentication scheme based on custom attributes. 7741-7756 - Joaquín Entrialgo

, Rafael Moreno-Vozmediano
, José Luis Díaz:
Cost and response time optimization of edge architectures. 7757-7773 - Essam H. Houssein, Mohammed R. Saad, Emre Çelik, Gang Hu, Abdelmgeid A. Ali, Hassan Shaban:

An enhanced sea-horse optimizer for solving global problems and cluster head selection in wireless sensor networks. 7775-7802 - Junqi Chen, Sijie Yang, Yong Wang, Miao Ye, Fan Lei:

Data repair accelerating scheme for erasure-coded storage system based on FPGA and hierarchical parallel decoding structure. 7803-7823 - Abdelaziz I. Hammouri, Malik Sh. Braik

, Heba Al-Hiary, Rawan A. Abdeen:
A binary hybrid sine cosine white shark optimizer for feature selection. 7825-7867 - Pooja Kumari, Ankit Kumar Jain

:
Timely detection of DDoS attacks in IoT with dimensionality reduction. 7869-7887 - Tao Hai, Arindam Sarkar

, Muammer Aksoy
, Rahul Karmakar
, Sarbajit Manna, Amrita Prasad:
Elevating security and disease forecasting in smart healthcare through artificial neural synchronized federated learning. 7889-7914 - Munish Saini

, Eshan Sengupta
, Suraaj Thakur:
Artificial intelligence assisted IoT-fog based framework for emergency fire response in smart buildings. 7915-7938 - Munish Saini

, Eshan Sengupta, Suraaj Thakur:
Correction: Artificial intelligence assisted IoT-fog based framework for emergency fire response in smart buildings. 7939 - Jiao Han, Kang Jia:

Entity relation joint extraction method for manufacturing industry knowledge data based on improved BERT algorithm. 7941-7954 - Divya Rani

, Sachin Tripathi, Ashish Tomar:
BSAS: blockchain-based shareable authentication scheme for smart healthcare. 7955-7979 - Hüseyin Bodur

, Imad Fakhri Taha Al Yaseen:
An Improved blockchain-based secure medical record sharing scheme. 7981-8000 - Alireza Souri, Sepehr Ebrahimi Mood, Mingliang Gao, Kuan-Ching Li:

Tournament based equilibrium optimization for minimizing energy consumption on dynamic task scheduling in cloud-edge computing. 8001-8013 - Ruchi Agrawal, Saurabh Singhal

, Ashish Sharma:
Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm. 8015-8030 - Xikang Wang

, Tongxi Wang, Hua Xiang:
A multi-threaded particle swarm optimization-kmeans algorithm based on MapReduce. 8031-8044 - Xikang Wang, Tongxi Wang, Hua Xiang:

Correction: A multi-threaded particle swarm optimization-kmeans algorithm based on MapReduce. 8045 - Reza Fallahi Kapourchali, Reza Mohammadi, Mohammad Nassiri:

P4httpGuard: detection and prevention of slow-rate DDoS attacks using machine learning techniques in P4 switch. 8047-8064 - Adel Salah Ould Khaoua, Abdelmadjid Boukra, Fella Bey:

On efficient interest forwarding in named data networks over IEEE 802.15.4: a comprehensive performance evaluation. 8065-8097 - Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel:

PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks. 8099-8117 - Youliang Cao, Shaopeng Guan

, Debao Wang, Zhenqi Wang:
BE-AC: reliable blockchain-based anti-counterfeiting traceability solution for pharmaceutical industry. 8119-8139 - Sunil Kumar Chowdhary, A. L. N. Rao:

QoS and reliability aware matched bald eagle task scheduling framework based on IoT-cloud in educational applications. 8141-8158 - Deepika Gautam, Sunil Prajapat, Pankaj Kumar

, Ashok Kumar Das, Korhan Cengiz
, Willy Susilo
:
Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage. 8159-8172 - Dani Mertens, Jeha Kim, Jingren Xu, Eunsam Kim, Choonhwa Lee:

Smart flow: a provenance-supported smart contract workflow architecture. 8173-8187 - Archana Chhabra, Rahul Saha, Gulshan Kumar:

PRIBANI: a privacy-ensured framework for blockchain transactions with information retrieval. 8189-8206 - Zhikuan Zhu, Hao Xu, Yingyu He, Zhuoyang Pan, Meiyu Zhang, Chengfeng Jian:

A DRL-based online real-time task scheduling method with ISSA strategy. 8207-8223 - Abdenacer Naouri, Nabil Abdelkader Nouri, Amar Khelloufi, Abdelkarim Ben Sada, Huansheng Ning, Sahraoui Dhelim

:
Efficient fog node placement using nature-inspired metaheuristic for IoT applications. 8225-8241 - Arun Kumar Dey

, Govind P. Gupta, Satya Prakash Sahu
:
BRL-ETDM: Bayesian reinforcement learning-based explainable threat detection model for industry 5.0 network. 8243-8268 - Alaa O. Khadidos, Hariprasath Manoharan, Shitharth Selvarajan

, Adil Omar Khadidos, Abdulrhman M. Alshareef
, Mohammed Altwijri
:
Distribution of resources beyond 5G networks with heterogeneous parallel processing and graph optimization algorithms. 8269-8287 - Anna-Valentini Michailidou

, Christos Bellas, Anastasios Gounaris:
Optimizing task allocation in multi-query edge analytics. 8289-8306 - Yuefeng Xu

, Rui Zhong
, Chao Zhang
, Jun Yu:
Multiplayer battle game-inspired optimizer for complex optimization problems. 8307-8331 - Ashish Kumar

, Kakali Chatterjee:
Securing internet of medical devices using energy efficient blockchain for healthcare 4.0. 8333-8348 - Xiaozong Wang, Fengqin Tang

, Yuanyuan Wang, Cuixia Li, Xuejing Zhao
:
Community detection in attributed networks using neighborhood information. 8349-8366 - Ahsan Nazir

, Jingsha He, Nafei Zhu, Muhammad Shahid Anwar
, Muhammad Salman Pathan
:
Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain. 8367-8392 - Hongbo Zhang, Xiwen Qin, Xueliang Gao:

Probe mechanism based particle swarm optimization for feature selection. 8393-8411 - Reyhane Ghafari, Najme Mansouri:

A novel energy-based task scheduling in fog computing environment: an improved artificial rabbits optimization approach. 8413-8458 - Yuanchun Lan, Jiahao Ling, Xiaohui Huang, Junyang Wang, Zhuyi Hu, Liyan Xiong:

A local global attention based spatiotemporal network for traffic flow forecasting. 8459-8475 - He Lu, Yanan Zhao, Yajing Song, Yang Yang, Guanjie He, Haiyang Yu, Yilong Ren:

A transfer learning-based intrusion detection system for zero-day attack in communication-based train control system. 8477-8492 - Ruiqi Song, Weike Nie, Aiqin Hou, Suqin Xue:

Dynamic random mutation hybrid Harris hawk optimization and its application to training kernel extreme learning machine. 8493-8530 - Yuan Zhao, Hongmin Gao, Shuangshuang Yuan, Yan Li:

A task offloading strategy considering forwarding errors based on cloud-fog collaboration. 8531-8555 - Veeramani Shanmugam, Huo-Chong Ling

, Lenin Gopal, Sivaraman Eswaran, Choo W. R. Chiong
:
Network-aware virtual machine placement using enriched butterfly optimisation algorithm in cloud computing paradigm. 8557-8575 - Santosh Shakya, Priyanka Tripathi:

A background-based new scheduling approach for scheduling the IoT network task with data storage in cloud environment. 8577-8594 - Yunsheng Tian, Dan Zhang, Hongbo Zhang, Juan Zhu, Xiaofeng Yue

:
An improved cuckoo search algorithm for global optimization. 8595-8619 - Chanki Kim

, Kang-Wook Chon:
Accelerating erasure coding by exploiting multiple repair paths in distributed storage systems. 8621-8635 - Chanki Kim, Kang-Wook Chon:

Correction: Accelerating erasure coding by exploiting multiple repair paths in distributed storage systems. 8637
Volume 27, Number 7, October 2024
- Lili Nemec Zlatolas, Tatjana Welzer, Lenka Lhotská:

Data breaches in healthcare: security mechanisms for attack mitigation. 8639-8654 - Rafika Saadouni, Chirihane Gherbi

, Zibouda Aliouat, Yasmine Harbi, Amina Khacha
:
Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature. 8655-8681 - Fatma Hendaoui

, Ahlem Ferchichi, Lamia Trabelsi, Rahma Meddeb
, Rawia Ahmed, Manel Khazri Khelifi:
Advances in deep learning intrusion detection over encrypted data with privacy preservation: a systematic review. 8683-8724 - Tanya Garg, Shashank Gupta, Mohammad S. Obaidat, Meghna Raj:

Drones as a service (DaaS) for 5G networks and blockchain-assisted IoT-based smart city infrastructure. 8725-8788 - Wengui Hu, Qingsong Cao, Mehdi Darbandi, Nima Jafari Navimipour:

A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques, challenges, and future directions. 8789-8815 - Yasar Khan

, Saad Mustafa
, Raja Wasim Ahmad, Tahir Maqsood, Faisal Rehman
, Javid Ali, Joel J. P. C. Rodrigues:
Content caching in mobile edge computing: a survey. 8817-8864 - Daisy Nkele Molokomme, Adeiza James Onumanyi, Adnan M. Abu-Mahfouz:

Hybrid metaheuristic schemes with different configurations and feedback mechanisms for optimal clustering applications. 8865-8887 - Pravali Manchala, Manjubala Bisi:

TSoptEE: two-stage optimization technique for software development effort estimation. 8889-8908 - Chandra Bhushan Kumar Yadav

, Dinesh Dash:
An efficient partial charging and data gathering strategy using multiple mobile vehicles in wireless rechargeable sensor networks. 8909-8930 - Yuxin Yang, Yihang Luo, Guangzhuo Zhu:

An optimized federated learning method based on soft label grouping for heterogeneous IoT. 8931-8938 - Zahra Jafari, Ahmad Habibizad Navin, Azadeh Zamanifar

:
Task scheduling approach in fog and cloud computing using Jellyfish Search (JS) optimizer and Improved Harris Hawks optimization (IHHO) algorithm enhanced by deep learning. 8939-8963 - Angel M. Gama Garcia, José Maria Alcaraz Calero

, Higinio Mora Mora, Qi Wang:
ServiceNet: resource-efficient architecture for topology discovery in large-scale multi-tenant clouds. 8965-8982 - K. Dilsad Çiçek, Taymaz Akan, Oguz Bayat:

Multi-modal Battle Royale optimizer. 8983-8993 - Ratul Sikder

, Md. Shohrab Hossain, Mohammed J. F. Alenazi
, Mohammed Atiquzzaman
:
A relaxed and faster switch migration framework to balance the load of distributed control plane in software defined networks. 8995-9012 - Sunil Prajapat

, Pankaj Kumar
, Sandeep Kumar
:
A privacy preserving quantum authentication scheme for secure data sharing in wireless body area networks. 9013-9029 - Muhammad Awais, Muhammad Adnan Khan, Zia Bashir

:
Exploring the stochastic patterns of hyperchaotic Lorenz systems with variable fractional order and radial basis function networks. 9031-9064 - Ali Ghaffari, Nasim Jelodari, Samira pouralish, Nahideh Derakhshanfard, Bahman Arasteh

:
Securing internet of things using machine and deep learning methods: a survey. 9065-9089 - Mohd Akbar, Mohammed Mujtaba Waseem, Syeda Husna Mehanoor

, Praveen Barmavatu
:
Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing. 9091-9105 - Mehmet Ulvi Simsek

, Ibrahim Kök, Suat Özdemir:
Cepair: an AI-powered and fog-based predictive CEP system for air quality monitoring. 9107-9121 - Reid Prichard, Wayne Strasser:

When Fewer Cores Is Faster: A Parametric Study of Undersubscription in High-Performance Computing. 9123-9136 - Jianlan Wang, Zhendong Wang

, Donglin Zhu, Shuxin Yang, Junling Wang, Dahai Li:
Reinforcement learning marine predators algorithm for global optimization. 9137-9190 - K. A. Asmitha, Vinod Puthuvath, Rafidha Rehiman K. A., S. L. Ananth:

Deep learning vs. adversarial noise: a battle in malware image analysis. 9191-9220 - Shahab Safaee, Meghdad Mirabi, Ali Asghar Safaei:

StreamFilter: a framework for distributed processing of range queries over streaming data with fine-grained access control. 9221-9241 - Sagnik Datta

, Suyel Namasudra:
Blockchain-based secure and scalable supply chain management system to prevent drug counterfeiting. 9243-9260 - Abdulaziz Aldaej

, Tariq Ahamed Ahanger, Mohammed Atiquzzaman, Imdad Ullah:
A comprehensive node-based botnet detection framework for IoT network. 9261-9281 - Heng Zhang, Yihong Zhang, Yanli Liu, Neal Naixue Xiong, Yawei Li:

Slam loop closure detection algorithm based on MSA-SG. 9283-9301 - Ruiling Tian, Yadan Xue, Yibo Hao, Yuting Song:

Optimal analysis in cognitive radio networks with imperfect sensing based on retrial queues with feedback and priority. 9303-9322 - Ahmad Awan, Muhammad Aleem, Altaf Hussain

, Radu Prodan:
DFARM: a deadline-aware fault-tolerant scheduler for cloud computing. 9323-9344 - Essam H. Houssein, Mahmoud Khalaf Saeed, Gang Hu, Mustafa M. Al-Sayed:

An efficient improved exponential distribution optimizer: application to the global, engineering and combinatorial optimization problems. 9345-9380 - Haythem Bany Salameh, Ayyoub Hussienat, Mohannad Alhafnawi, Ahmad Al Ajlouni:

Autonomous UAV-based surveillance system for multi-target detection using reinforcement learning. 9381-9394 - Sujit Biswas, Rajat Subhra Goswami, K. Hemant Kumar Reddy:

Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart cities. 9395-9414 - Sadananda Lingayya

, Sathyendra Bhat Jodumutt, Sanjay Rangrao Pawar, Anoop Vylala, Senthilkumar Chandrasekaran
:
Dynamic task offloading for resource allocation and privacy-preserving framework in Kubeedge-based edge computing using machine learning. 9415-9431 - Sadananda Lingayya

, Sathyendra Bhat Jodumutt, Sanjay Rangrao Pawar, Anoop Vylala, Senthilkumar Chandrasekaran:
Correction: Dynamic task offloading for resource allocation and privacy-preserving framework in Kubeedge-based edge computing using machine learning. 9433 - Miguel Landry Foko Sindjoung

, Mthulisi Velempini, Vianney Kengne Tchendji
:
ARPMEC: an adaptive mobile edge computing-based routing protocol for IoT networks. 9435-9450 - Ali Hosseinalipour, Reza Ghanbarzadeh

, Bahman Arasteh
, Farhad Soleimanian Gharehchopogh, Seyedali Mirjalili:
A metaheuristic approach based on coronavirus herd immunity optimiser for breast cancer diagnosis. 9451-9475 - Najib Mouhassine

, Mohamed Moughit
:
A mean opinion score prediction model for VoIP calls offloading handover from LTE to WiFi. 9477-9495 - Mohammed Jasim, Nazli Siasi:

Hybrid-grained migration method for load redistribution in heavily-loaded fog nodes. 9497-9507 - Chengtian Ouyang, Chang Liao, Donglin Zhu, Yangyang Zheng, Changjun Zhou, Chengye Zou:

Compound improved Harris hawks optimization for global and engineering optimization. 9509-9568 - Somayeh Danesh, Javad Akbari Torkestani:

CLARA: clustered learning automata-based routing algorithm for efficient FANET communication. 9569-9585 - Çigdem Avci Salma

, Bedir Tekinerdogan
, Cagatay Catal:
Design tactics for tailoring transformer architectures to cybersecurity challenges. 9587-9613 - Zhao Xu

, Zhiyang Jia, YiWei Wei, Shuyan Zhang, Zhong Jin, Wenpei Dong:
CSDANet: a new lightweight fault diagnosis framework towards heavy noise and small samples. 9615-9634 - Zaid Mustafa

, Rashid Amin, Hamza Aldabbas, Naeem Ahmed
:
Intrusion detection systems for software-defined networks: a comprehensive study on machine learning-based techniques. 9635-9661 - Chengang Dong

, Yuhao Tang, Hanyue Zhu, Liyan Zhang:
HCA-YOLO: a non-salient object detection method based on hierarchical attention mechanism. 9663-9678 - Jaehwan Park

, Zeinab Rezaeifar, Changhee Hahn
:
Securing multi-client range queries over encrypted data. 9679-9692 - Hui Zeng, Xuewei Duan, Xiaohui Huang, Qiang Cui:

STA-former: encoding traffic flows with spatio-temporal associations in transformer networks for prediction. 9693-9714 - Huangshui Hu, Xinji Fan, Chuhang Wang, Tingting Wang, Yuhuan Deng:

Particle swarm optimization and fuzzy logic based clustering and routing protocol to enhance lifetime for wireless sensor networks. 9715-9734 - Arthur Sabino, Luiz Nelson Lima, Carlos Brito, Leonel Feitosa, Marcos F. Caetano, Priscila Solís Barreto, Francisco Airton Silva:

Forest fire monitoring system supported by unmanned aerial vehicles and edge computing: a performance evaluation using petri nets. 9735-9755 - Arjun Singh, Preeti Mishra

, P. Vinod, Avantika Gaur, Mauro Conti
:
SFC-NIDS: a sustainable and explainable flow filtering based concept drift-driven security approach for network introspection. 9757-9782 - Wei Sun, Lang Li, Xiantong Huang:

LTLBC: a low-latency lightweight block cipher for internet of things. 9783-9794 - Cheng Wang, Lin Chen

, Chengjie Tang, Yongsong Wang, Yaqiao Xian, Yuhao Zhao, Hai Xue, Zhan Huan:
Enhanced time-sensitive networking configuration detection using optimized BPNN with feature selection for industry 4.0. 9795-9810 - Mohd Ahsan Siddiqui, C. Rama Krishna, Mala Kalra

:
Anomaly detection framework for IoT-enabled appliances using machine learning. 9811-9835 - Ying Shen, Zhanyou Ma, Zishu Jiang, Yahui Li, Guoli Qin:

Performance analysis of P2P network based on differentiated service Geo/Geo/1 + 1 queue. 9837-9849 - Wael Khalafalla, Wen-Xing Zhu, Ahmed Elkhalil, Issameldeen Elfadul:

Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs. 9851-9871 - Posham Bhargava Reddy, Chapram Sudhakar:

IOTD: intelligent offloading of tasks with deadlines in edge-fog-cloud computing environment using hybrid approach. 9873-9885 - Fengxian Wang, Senlin Bi, Shaozhi Feng, Huanlong Zhang, Chenglin Guo:

Combined economic and emission power dispatch problems through multi-objective Honey Badger optimizer. 9887-9915 - Elsayed Elsedimy, Hala Elhadidy

, Sara M. M. Abo Hashish
:
A novel intrusion detection system based on a hybrid quantum support vector machine and improved Grey Wolf optimizer. 9917-9935 - Meng Cui, Jue Chen, Xihe Qiu, Wenjing Lv, Haijun Qin, Xinyu Zhang:

Multi-class intrusion detection system in SDN based on hybrid BiLSTM model. 9937-9956 - Kai Zhang

, Tao Chen, Siyuan Chen, Lifei Wei, Jianting Ning:
Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access control. 9957-9973 - Nasim Soltani, Amir Masoud Rahmani, Mahdi Bohlouli, Mehdi Hosseinzadeh

:
Robust intrusion detection for network communication on the Internet of Things: a hybrid machine learning approach. 9975-9991 - Shivendu Mishra, Anurag Choubey, Sri Vaibhav Devarasetty, Nelson Sharma, Rajiv Misra:

An innovative multi-head attention model with BiMGRU for real-time electric vehicle charging management through deep reinforcement learning. 9993-10023 - Ernest Ntizikira

, Lei Wang, Jenhui Chen, Xinxin Lu:
Attention-based ResNet for intrusion detection and severity analysis using sliding window blockchain and firewall in IoT. 10025-10051 - Yunpeng Wang, Jixiang Zhang, Mengjian Zhang

, Deguang Wang
, Ming Yang:
Enhanced artificial ecosystem-based optimization for global optimization and constrained engineering problems. 10053-10092 - Bahman Arasteh

, Keyvan Arasteh, Ali Ghaffari, Reza Ghanbarzadeh
:
A new binary chaos-based metaheuristic algorithm for software defect prediction. 10093-10123 - Jiaofen Nan, Siyuan Zhang, Duan Li, Kaifan Zhang, Chuang Han

, Yinghui Meng, Tanxin Zhu:
Innovative combination of covariance analysis-based sliding time window and task-related component analysis for steady-state visual evoked potential recognition. 10125-10139 - Rui Zhong

, Qinqin Fan
, Chao Zhang
, Jun Yu:
Hybrid remora crayfish optimization for engineering and wireless sensor network coverage optimization. 10141-10168 - Prity Rani

, Rohit Kumar Sachan, Sonal Kukreja:
Educert-chain: a secure and notarized educational certificate authentication and verification system using permissioned blockchain. 10169-10196 - Nastaran Mehrabi Hashjin

, Mohammad Hussein Amiri
, Ardashir Mohammadzadeh, Seyedali Mirjalili, Nima Khodadadi
:
Novel hybrid classifier based on fuzzy type-III decision maker and ensemble deep learning model and improved chaos game optimization. 10197-10234
Volume 27, Number 8, November 2024
- Alper Alimoglu

, Can C. Özturan:
An autonomous blockchain-based workflow execution broker for e-science. 10235-10244 - Zigang Chen, Fan Liu, Danlong Li, Yuhong Liu, Xingchun Yang, Haihua Zhu:

Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme. 10245-10264 - Navid Khaledian

, Marcus Völp
, Sadoon Azizi, Mirsaeid Hosseini Shirvani:
AI-based & heuristic workflow scheduling in cloud and fog computing: a systematic review. 10265-10298 - Takwa Allaoui, Kaouther Gasmi, Tahar Ezzedine:

Reinforcement learning based task offloading of IoT applications in fog computing: algorithms and optimization techniques. 10299-10324 - Mamta Narwaria, Shruti Jaiswal:

Multicriteria client selection model using class topper optimization based optimal federated learning for healthcare informatics. 10325-10342 - Xu Yang, Feiyang Wu, Linqiu Gui

, Shengshi Zhong:
A tube-based model predictive control method for intelligent vehicles path tracking. 10343-10357 - Ala Mughaid

, Asma Alnajjar, Subhieh M. El-Salhi
, Khaled Almakadmeh, Shadi AlZu'bi:
A cutting-edge intelligent cyber model for intrusion detection in IoT environments leveraging future generations networks. 10359-10375 - Mahdieh Maazalahi, Soodeh Hosseini:

K-means and meta-heuristic algorithms for intrusion detection systems. 10377-10419 - Xing Huang, Li Li, Wei Wang, Lu Liu, Meng Li:

Intelligent patrol inspection of low code enabled electric power communication equipment based on digital transformation. 10421-10435 - Xiaolong Zhao, Zhenjie Huang:

Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing. 10437-10453 - Sahar Cherif, Hamdi Kchaou

, Amel Ksibi, Ghadah Aldehim:
Medical diagnosis using interval type-2 fuzzy similarity measures. 10455-10466 - Gökçe Karacayilmaz

, Harun Artuner:
A novel approach detection for IIoT attacks via artificial intelligence. 10467-10485 - Malik Braik

, Mohammed A. Awadallah, Hussein Alzoubi, Heba Al-Hiary, Abdelazim G. Hussien:
Adaptive dynamic elite opposition-based Ali Baba and the forty thieves algorithm for high-dimensional feature selection. 10487-10523 - Kajol Mittal, Payal Khurana Batra:

Graph-ensemble fusion for enhanced IoT intrusion detection: leveraging GCN and deep learning. 10525-10552 - Xiaofei Zhao, Mengqian Yang, Hongji Yang:

A knowledge graph embedding model based on multi-level analogical reasoning. 10553-10567 - Piyush Sewal

, Hari Singh
:
Performance optimization of Spark MLlib workloads using cost efficient RICG model on exponential projective sampling. 10569-10588 - Nima Khodadadi

, Ehsan Khodadadi, Benyamin Abdollahzadeh, El-Sayed M. El-Kenawy, Pezhman Mardanpour
, Weiguo Zhao
, Farhad Soleimanian Gharehchopogh, Seyedali Mirjalili:
Multi-objective generalized normal distribution optimization: a novel algorithm for multi-objective problems. 10589-10631 - Jhuma Dutta, Subhas Barman, Soubhik Sen

, Aniruddha Routh, Matangini Chattopadhyay, Samiran Chattopadhyay:
Easypay: a user-friendly blockchain-powered payment gateway. 10633-10652 - Swathi Baswaraju

, Soma Sekhar Kolisetty, G. Venkata Sivanarayana, Srinivasa Rao Battula:
Efficientnetv2-RegNet: an effective deep learning framework for secure SDN based IOT network. 10653-10670 - Zhendong Wang

, Donghui Dai, Zhiyuan Zeng, Daojing He, Sammy Chan:
Multi-strategy enhanced Grey Wolf Optimizer for global optimization and real world problems. 10671-10715 - Safwan Omari, Kshitiz Basnet, Mohammad Wardat

:
Investigating large language models capabilities for automatic code repair in Python. 10717-10731 - Bo Wen, Shanzhi Li, Hooman Motevalli:

Exploitation of healthcare IoT-fog-based smart e-health gateways: a resource optimization approach. 10733-10755 - Lei An, Jiankai Qiu, Hanzhi Zhang, Chen Liu:

Design of distributed network intrusion prevention system based on Spark and P2DR models. 10757-10776 - Hongye Li, Jianan Wang, Yanjie Zhu:

Integration of bat algorithm and salp swarm intelligence with stochastic difference variants for global optimization. 10777-10818 - Buqing Cao, Siyuan Wang, Xiang Xie, Qian Peng, Yating Yi, Zhenlian Peng:

ARIR: an intent recognition-based approach for API recommendation. 10819-10832 - Nasir Ahmad Jalali

, Hongsong Chen:
Comprehensive framework for implementing blockchain-enabled federated learning and full homomorphic encryption for chatbot security system. 10859-10882 - Rohit Singh

, Krishna Pal Sharma, Lalit Kumar Awasthi:
A machine learning-based ensemble model for securing the IoT network. 10883-10897 - Neelam Gupta

, Sarvesh Tanwar
, Sumit Badotra:
Performance analysis of ODL and RYU controllers' against DDoS attack in software defined networks. 10899-10919 - Sumit Bansal, Himanshu Aggarwal:

A multiobjective optimization of task workflow scheduling using hybridization of PSO and WOA algorithms in cloud-fog computing. 10921-10952 - Shiva Sharma

, Manjit Kaur
, Naresh Kumar
:
Enhanced 3D indoor position estimation from smartphone's inbuilt IMU and pressure sensor via hybrid approach. 10953-10970 - Shristy Gupta, Amritesh Kumar, Lokendra Vishwakarma, Debasis Das:

Enhancing blockchain scalability and security: the early fraud detection (EFD) framework for optimistic rollups. 10971-10992 - Shabnam Bawa, Prashant Singh Rana, Rajkumar Tekchandani:

Multivariate time series ensemble model for load prediction on hosts using anomaly detection techniques. 10993-11016 - Yaru Chen, Jie Zhou, Xingshi He, Xinglong Luo:

An improved density peaks clustering based on sparrow search algorithm. 11017-11037 - Rahma Djiroun, Meriem Amel Guessoum, Kamel Boukhalfa, Elhadje Benkhelifa:

Natural language why-question answering system in business intelligence context. 11039-11067 - Apurva Khandekar

, Sheikh Fahad Ahmad
:
Secured IoT architecture for personalized marketing using blockchain framework with deep learning technology. 11069-11084 - Khaoula Braiki, Habib Youssef:

An experimental and comparative study examining resource utilization in cloud data center. 11085-11102 - Abdullah Aljumah, Tariq Ahamed Ahanger, Imdad Ullah:

Internet of things-based secure architecture to automate industry. 11103-11118 - Yu Tang, Qi Dai

, Mengyuan Yang, Lifang Chen, Ye Du:
Software defect prediction ensemble learning algorithm based on 2-step sparrow optimizing extreme learning machine. 11119-11148 - Hassan Harb, Mohamad Hijazi, Mohamed-el-Amine Brahmia

, Ali Kadhum Idrees, Mouhammad Alakkoumi
, Ali Jaber, Abdelhafid Abouaissa:
An intelligent mechanism for energy consumption scheduling in smart buildings. 11149-11165 - Ananya Chakraborty

, Mohit Kumar, Nisha Chaurasia:
An intelligent offloading and resource allocation using Fuzzy-based HHGA algorithm for IoT applications. 11167-11185 - Ishak Paçal, Omer Celik, Bilal Bayram, António Cunha

:
Enhancing EfficientNetv2 with global and efficient channel attention mechanisms for accurate MRI-Based brain tumor classification. 11187-11212 - Jia-Lin Chan

, Wai-Kong Lee, Denis Chee-Keong Wong, Wun-She Yap, Boon-Yaik Ooi, Bok-Min Goi:
High throughput acceleration of NIST lightweight authenticated encryption schemes on GPU platform. 11213-11235 - Muhammad Asad

, Safa Otoum:
Federated learning for efficient spectrum allocation in open RAN. 11237-11247 - Amira Rayane Benamer, Nejib Ben Hadj-Alouane

, Khaled Boussetta, Atidel B. Hadj-Alouane:
A Genetic Algorithm-based approach for placement in the fog of latency-sensitive multiplayer game servers. 11249-11275 - Zeynep Garip, Ekin Ekinci, Kasim Serbest

, Süleyman Eken:
Chaotic marine predator optimization algorithm for feature selection in schizophrenia classification using EEG signals. 11277-11297 - Jian Zheng

, Lin Li, Shiyan Wang, Huyong Yan:
Binary classification for imbalanced datasets using twin hyperspheres based on conformal method. 11299-11315 - Bo Liu, Guo Zhou, Yongquan Zhou, Qifang Luo, Yuanfei Wei:

Quantum-inspired multi-objective African vultures optimization algorithm with hierarchical structure for software requirement. 11317-11345 - PLS Jayalaxmi, Manali Chakraborty, Rahul Saha, Gulshan Kumar, Mauro Conti

:
MADESANT: malware detection and severity analysis in industrial environments. 11347-11367 - Sanjeev Sharma, Mahendra Pratap Yadav:

A collective approach to reach known and unknown target in multi agent environment using nature inspired algorithms. 11369-11392 - Yalian Yang, Xinyu Luo, Wei Li, Changdong Liu, Qing Ye, Peng Liang:

AAPF*: a safer autonomous vehicle path planning algorithm based on the improved A* algorithm and APF algorithm. 11393-11406 - Arif Ullah, Zakaria Alomari, Suboh Alkhushayni, Du'a Al-Zaleq, Mohammad Bany Taha, Hassnae Remmach:

Improvement in task allocation for VM and reduction of Makespan in IaaS model for cloud computing. 11407-11426 - Medha Kirti

, Ashish Kumar Maurya, Rama Shankar Yadav:
Fault-tolerant allocation of deadline-constrained tasks through preemptive migration in heterogeneous cloud environments. 11427-11454 - Mingyan Li, Shuo Wang, Tao Huang

, Yunjie Liu:
MPTD: optimizing multi-path transport with dynamic target delay in datacenters. 11455-11469 - Mostafa Matin, Amin Mehranzadeh

, Mohsen Chekin, Mohammad Mosleh:
HTPA: a hybrid traffic pattern aware arbitration strategy for network on chip systems. 11471-11489 - Fazal Waris, Feipeng Da, Shanghuan Liu:

Stacked ensemble learning for facial gender classification using deep learning based features extraction. 11491-11513 - Hongzhi Li, Dun Li, Wei Liang

:
A smart contract-driven access control scheme with integrity checking for electronic health records. 11515-11535 - Tengjiao Liu:

XsimGCL's cross-layer for group recommendation using extremely simple graph contrastive learning. 11537-11552 - Haodi Quan, Yun Zhang, Qiaoqin Li, Yongguo Liu:

TPBFS: two populations based feature selection method for medical data. 11553-11568 - Anita Thakur

, Virender Ranga
, Ritu Agarwal:
Workload dynamics implications in permissioned blockchain scalability and performance. 11569-11593 - Xi Liu

, Jun Liu, Hong Wu, Jing Dong:
A family of truthful mechanisms for resource allocation with multi-attribute demand in mobile edge computing. 11595-11610 - Limin Xia, Weiye Fu:

Spatial-temporal multiscale feature optimization based two-stream convolutional neural network for action recognition. 11611-11626 - Conrado P. Vizcarra, Shadan Alhamed, Abdulelah Abdallah Algosaibi, Mohammed Alnaeem, Adel Aldalbahi, Nura Aljaafari

, Ahmad Sawalmeh, Mahmoud Nazzal, Abdallah Khreishah, Abdulaziz Alhumam, Muhammad Anan:
Deep learning adversarial attacks and defenses on license plate recognition system. 11627-11644 - Komal Singh Gill

, Sharad Saxena, Anju Sharma, Arwinder Dhillon
:
GTBNN: game-theoretic and bayesian neural networks to tackle security attacks in intelligent transportation systems. 11645-11665 - Peng Chen, Shengwei Tian, Xin Wang, Xinjun Pei

, Weitao Nong, Hao Zhang:
Efficient malware detection through inter-component communication analysis. 11667-11682 - Abdelkader Ouared, Moussa Amrani, Abdelhafid Chadli

, Pierre-Yves Schobbens
:
Deep variability modeling to enhance reproducibility of database performance testing. 11683-11708 - Hongrui Lin, Guodong Liu, Weiwei Lin, Xinhua Wang, Xiumin Wang:

A novel virtual machine consolidation algorithm with server power mode management for energy-efficient cloud data centers. 11709-11725 - Nidhi Malik, Neeti Sangwan, Navdeep Bohra

, Ashish Kumari, Dinesh Sheoran, Manya Dabas:
HyperSegRec: enhanced hypergraph-based recommendation system with user segmentation and item similarity learning. 11727-11745 - Behnam Mohammad Hasani Zade, Najme Mansouri

, Mohammad Masoud Javidi:
Multi-objective task scheduling based on PSO-Ring and intuitionistic fuzzy set. 11747-11802 - Lizia Sahkhar, Bunil Kumar Balabantaray, Sanjaya Kumar Panda:

Mobility-enhanced delay-aware cloudlet movement and placement using cluster-based technique in a smart healthcare platform. 11803-11821 - Zhihe Yang, Xiaogang Wang, Rongting Li, Yangli Liu:

HMM-CPM: a cloud instance resource prediction method tracing the workload trends via hidden Markov model. 11823-11838
Volume 27, Number 9, December 2024
- Atul Barve

, Pushpinder Singh Patheja:
A hybrid deep learning based enhanced and reliable approach for VANET intrusion detection system. 11839-11850 - Abhishek Srivastava, Dushmanta Kumar Das, Siseyiekuo Khatsu:

Optimal power scheduling of microgrid considering renewable sources and demand response management. 11851-11872 - G. Sucharitha, Deepthi Godavarthi

, Janjhyam Venkata Naga Ramesh, Muhammad Ijaz Khan
:
Secure and efficient content-based image retrieval using dominant local patterns and watermark encryption in cloud computing. 11873-11889 - Yayin He, Xiangshun Li

:
Causal network construction based on KICA-ECCM for root cause diagnosis of industrial processes. 11891-11909 - Mengjian Zhang

, Guihua Wen, Pei Yang:
Chaos-BBO: Chaos balanced butterfly optimizer with dynamic continuum chaotic strategies and its applications. 11911-11952 - Sasidharan Velu, Sukhpal Singh Gill, Subramaniam Subramanian Murugesan

, Huaming Wu, Xingwang Li:
CloudAIBus: a testbed for AI based cloud computing environments. 11953-11981 - Ashish Kumari, Shailender Kumar

, Ram Shringar Raw:
Modified clustering and incentivized stable CH selection for reliable VANET communication. 11983-12005 - Jiao Li, Wanting Zhao:

Blockchain cross-chain protocol based on improved hashed time-locked contract. 12007-12027 - V. R. Rajasekar

, S. Rajkumar:
DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN. 12029-12068 - Hui Zeng, Qiang Cui, Xiaohui Huang, Xuewei Duan:

STTD: spatial-temporal transformer with double recurrent graph convolutional cooperative network for traffic flow prediction. 12069-12089 - Yuhong Sun, Jiatao Wang, Fengyin Li:

Efficient integer division computation protocols based on partial homomorphic encryption. 12091-12102 - Yuhong Sun, Jiatao Wang, Fengyin Li:

Correction: Efficient integer division computation protocols based on partial homomorphic encryption. 12103 - Xiaoping Zhao, Qianqian Su

:
Time-limited ownership delegation scheme with revocation security for healthcare. 12105-12121 - Xin Li:

A faster deep graph clustering network based on dynamic graph weight update mechanism. 12123-12140 - Taief Alaa Alamiedy, Mohammed Anbar, Bahari Belaton:

OPSMOTE-ML: an optimized SMOTE with machine learning models for selective forwarding attack detection in low power and lossy networks of internet of things. 12141-12184 - Ruchika Malhotra, Kishwar Khan

:
A novel software defect prediction model using two-phase grey wolf optimisation for feature selection. 12185-12207 - Rui Zhong, Jun Yu:

A novel evolutionary status guided hyper-heuristic algorithm for continuous optimization. 12209-12238 - Rui Zhong, Jun Yu:

DEA2H2: differential evolution architecture based adaptive hyper-heuristic algorithm for continuous optimization. 12239-12266 - Burhan Sher, Mustafeez Ahmad, Khwaja Mansoor, Yawar Abbas Bangash, Waseem Iqbal, Shynar Mussiraliyeva:

Lightweight secure authentication protocol for automatic dependent surveillance broadcast system. 12267-12282 - Feifan Wang, Nuojing Liang, Faguo Wu, Bo Zhou, Jiawei Nie, Xiao Zhang:

Three-party evolutionary game-based analysis and stability enhancement of improved PBFT consensus mechanism. 12283-12309 - Wenlong Zhao, Yuanchao Hu, Xiaopeng Yan, Xiaowei Liu, Rixian Ding, Chaofeng Dai, Ying Cao:

Enhanced K-NN with Bayesian optimization algorithm for predicting energy efficiency of smart grids in IoT. 12311-12322 - Chengang Dong

, Yuhao Tang, Liyan Zhang:
MDA-YOLO Person: a 2D human pose estimation model based on YOLO detection framework. 12323-12340 - D. Praveena Anjelin, S. Ganesh Kumar:

An effective classification using enhanced elephant herding optimization with convolution neural network for intrusion detection in IoMT architecture. 12341-12359 - Haobin Zhang, Hongjun San, Jiupeng Chen, Haijie Sun, Lin Ding, Xingmei Wu:

Black eagle optimizer: a metaheuristic optimization method for solving engineering optimization problems. 12361-12393 - Carlos Melo, Glauber D. Gonçalves, Francisco Airton Silva, André Soares:

A comprehensive hyperledger fabric performance evaluation based on resources capacity planning. 12395-12410 - Si-Wen Zhang, Jie-Sheng Wang, Shi-Hui Zhang, Yu-Xuan Xing, Yun-Cheng Sun, Yuan-Zheng Gao:

Task scheduling in cloud computing systems using honey badger algorithm with improved density factor and foucault pendulum motion. 12411-12457 - Sheharyar Khan

, Jiangbin Zheng, Hassan Ali
:
Soft computing approaches for dynamic multi-objective evaluation of computational offloading: a literature review. 12459-12481 - Rui Zhong, Jun Yu:

Gene-targeting multiplayer battle game optimizer for large-scale global optimization via cooperative coevolution. 12483-12508 - Kandoussi el Mehdi, Adam Houmairi

, Iman El Mir, Mostafa Bellafkih
:
Enhancing cloud security: harnessing bayesian game theory for a dynamic defense mechanism. 12509-12526 - Xiaohua Wu, Jinpeng Chang, Zirui Wang, Jun Cheng:

DyPoA: enhanced PoA protocol with a dynamic set of validators for IoT. 12527-12545 - Guilherme Galante, Rodrigo da Rosa Righi, Cristiane de Andrade:

Extending parallel programming patterns with adaptability features. 12547-12568 - Li Yuan, Xiongjun Tian, Jiacheng Yuan, Jingyu Zhang, Xiaojing Dai, Ali Asghar Heidari, Huiling Chen, Sudan Yu:

Enhancing network security with information-guided-enhanced Runge Kutta feature selection for intrusion detection. 12569-12602 - Kavitha Dhanushkodi, Raushan Kumar, Pratyush Mittal, Saumye Saran Das, Neelam Naga Saivenkata Suryavenu, Kiruthika Venkataramani:

Enhancing resource utilization and privacy in IoT data placement through fuzzy logic and PSO optimization. 12603-12626 - Anas M. R. Alsobeh, Khalid Gaber, Mahmoud M. Hammad, Maryam Nuser, Amani M. Shatnawi:

Android malware detection using time-aware machine learning approach. 12627-12648 - Fatma Hendaoui, Hamdi Eltaief, Habib Youssef:

Enhancing data authentication in software-defined networking (SDN) using multiparty computation. 12649-12668 - Yun Sun, Yu Li, Weihang Zhang, Fengju Zhang, Hanruo Liu, Ningli Wang, Huiqi Li

:
Automatic diagnosis of myopic maculopathy using continuous severity ranking labels. 12669-12688 - Wei Hu, Ji Feng, Degang Yang

:
An improved density peaks clustering algorithm using similarity assignment strategy with K-nearest neighbors. 12689-12706 - Krishna Kant Agrawal, Devesh Mishra, Nitin Kumar Gaur, Vandana Yadav, Brijesh Mishra

:
Machine learning driven four-elements high gain MIMO antenna for wireless connectivity. 12707-12725 - Qun Zhou, Wenting Shen:

PPFLV: privacy-preserving federated learning with verifiability. 12727-12743 - Ali Mohammadzadeh, Seyedali Mirjalili:

Eel and grouper optimizer: a nature-inspired optimization algorithm. 12745-12786 - Alparslan Fisne, M. Mücahit Enes Yurtsever, Süleyman Eken:

Energy-efficient buildings with energy-efficient optimized models: a case study on thermal bridge detection. 12787-12797 - Essam H. Houssein, Doaa A. Abdelkareem, Gang Hu, Mohamed Abdel Hameed

, Ibrahim A. Ibrahim
, Mina Younan:
An effective multiclass skin cancer classification approach based on deep convolutional neural network. 12799-12819 - Mamatha Maddu, Yamarthi Narasimha Rao

:
Res2Net-ERNN: deep learning based cyberattack classification in software defined network. 12821-12839 - R. Shanmugapriya, S. V. N. Santhosh Kumar:

SCIDP-Secure cloud-integrated data dissemination protocol for efficient reprogramming in internet of things. 12841-12860 - Mohammad Yekta

, Hadi Shahriar Shahhoseini:
SCRUB: a novel energy-efficient virtual machines selection and migration scheme in cloud data centers. 12861-12874 - Huanlong Zhang, Chenglin Guo, Jianwei Zhang, Xin Wang, Jiaxiang Zhang:

An improved Tasmanian devil optimization algorithm based on sine-cosine strategy with dynamic weighting factors. 12875-12897 - Liji Luo, Siwei Wei, Hua Tang, Chunzhi Wang:

An effective partition-based framework for virtual machine migration in cloud services. 12899-12917 - Manoj Aggarwal, Pritam Rani, Prity Rani, Pratima Sharma:

Revolutionizing agri-food supply chain management with blockchain-based traceability and navigation integration. 12919-12942 - B. Dhanalaxmi

, Yeligeti Raju, B. Saritha, N. Sabitha, Namita Parati
, Kandula Damodhar Rao
:
OptFBFN: IOT threat mitigation in software-defined networks based on fuzzy approach. 12943-12963 - Abdelkarim Ben Sada

, Amar Khelloufi, Abdenacer Naouri, Huansheng Ning, Sahraoui Dhelim
:
Hybrid metaheuristics for selective inference task offloading under time and energy constraints for real-time IoT sensing systems. 12965-12981 - Nisha Pal, Dharmendra Kumar Yadav:

Modeling and verification of software evolution using bigraphical reactive system. 12983-13003 - Xiwen Qin, Siqi Zhang, Xiaogang Dong, Hongyu Shi, Liping Yuan:

Improved aquila optimizer with mRMR for feature selection of high-dimensional gene expression data. 13005-13027 - Wei Zhao, Weiming Gao, Shengnan Gao, Chenmei Teng, Xiaoya Zhu:

Quantum competitive decision algorithm for the emergency siting problem under given deadline conditions. 13029-13046 - Rashmi Keshri, Deo Prakash Vidyarthi:

Energy-efficient communication-aware VM placement in cloud datacenter using hybrid ACO-GWO. 13047-13074 - Y. Sreenivasa Rao, Vikas Srivastava

, Tapaswini Mohanty, Sumit Kumar Debnath
:
Designing quantum-secure attribute-based encryption. 13075-13091 - Abdelazim G. Hussien, Amit Chhabra

, Fatma A. Hashim, Adrian Pop:
A novel hybrid Artificial Gorilla Troops Optimizer with Honey Badger Algorithm for solving cloud scheduling problem. 13093-13128 - Ankit Kumar Jain

, Hariom Shukla, Diksha Goel:
A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks. 13129-13164 - Jun Wang, Ze Luo, Chenglong Wang:

A two-way trust routing scheme to improve security in fog computing environment. 13165-13185 - Yilin Li, Yanxian Bi, Jian Wang, Zhiqiang Li, Hongxia Zhang, Peiying Zhang:

Unmanned aerial vehicle assisted communication: applications, challenges, and future outlook. 13187-13202 - Changjun Wu, Qingzhen Li, Qiaohua Wang, Huanlong Zhang, Xiaohui Song:

A hybrid northern goshawk optimization algorithm based on cluster collaboration. 13203-13237 - Gholam Reza Zargar, Hamid Barati, Ali Barati:

An authentication mechanism based on blockchain for IoT environment. 13239-13255 - Ning Sha, Xiaochun Wu, Jinpeng Wen, Jinglei Li, Chuanhuang Li:

Adaptive spatio-temporal graph convolutional network with attention mechanism for mobile edge network traffic prediction. 13257-13272 - Debashreet Das, Sayak Sengupta, Shashank Mouli Satapathy, Deepanshu Saini:

HOGWO: a fog inspired optimized load balancing approach using hybridized grey wolf algorithm. 13273-13294 - Heming Jia

, Qixian Wen, Yuhao Wang, Seyedali Mirjalili:
Catch fish optimization algorithm: a new human behavior algorithm for solving clustering problems. 13295-13332 - Yongxing Lin, Xiaoyan Xu, Hongyun Xu:

A revolutionary approach to use convolutional spiking neural networks for robust intrusion detection. 13333-13352 - Mazhar Hussain, Said Nabi, Mushtaq Hussain

:
RAPTS: resource aware prioritized task scheduling technique in heterogeneous fog computing environment. 13353-13377 - Yunfa Li, Hui Li:

A novel real-time object detection method for complex road scenes based on YOLOv7-tiny. 13379-13393 - Ilhem Salah

, Khaled Jouini, Cyril-Alexandre Pachon, Ouajdi Korbaa
:
Connecting the dots between stance and fake news detection with blockchain, proof of reputation, and the Hoeffding bound. 13395-13405 - Mostafa Raeisi-Varzaneh

, Omar Dakkak
, Yousef Fazea
, Mohammed Golam Kaosar
:
Advanced cost-aware Max-Min workflow tasks allocation and scheduling in cloud computing systems. 13407-13419
Volume 27, Number 10, December 2024
- Gaoqiang Dong, Jia Wang, Mingjing Wang, Tingting Su:

An improved scheduling with advantage actor-critic for Storm workloads. 13421-13433 - Junnan Liu, Yifan Liu, Yongkang Ding:

Research and optimization of task scheduling algorithm based on heterogeneous multi-core processor. 13435-13453 - Sabina Priyadarshini, Tukaram Namdev Sawant, Gitanjali Bhimrao Yadav, J. Premalatha, Sanjay R. Pawar:

Enhancing security and scalability by AI/ML workload optimization in the cloud. 13455-13469 - Mohammad H. Nadimi-Shahraki, Shokooh Taghian, Danial Javaheri

, Ali Safaa Sadiq, Nima Khodadadi
, Seyedali Mirjalili:
MTV-SCA: multi-trial vector-based sine cosine algorithm. 13471-13515 - Jie Zhou, Runxin Zhang:

A weighted multi-view clustering via sparse graph learning. 13517-13530 - Muhammed Tmeizeh

, Carlos Rodríguez-Domínguez
, María Visitación Hurtado-Torres:
File chunking towards on-chain storage: a blockchain-based data preservation framework. 13531-13546 - Yi Jiang, Jin Xue, Kun Hu, Tianxiang Chen, Tong Wu:

Saver: a proactive microservice resource scheduling strategy based on STGCN. 13547-13564 - Feng Xia, Wenhao Cheng

:
A survey on privacy-preserving federated learning against poisoning attacks. 13565-13582 - Yigit Çagatay Kuyu, Fahri Vatansever

:
A hybrid approach of ALNS with alternative initialization and acceptance mechanisms for capacitated vehicle routing problems. 13583-13606 - Mohammad Fraiwan, Natheer Khasawneh:

Visual identification of sleep spindles in EEG waveform images using deep learning object detection (YOLOv4 vs YOLOX). 13607-13620 - Rahul Mishra

, Dharavath Ramesh, Nazeeruddin Mohammad
, Bhaskar Mondal:
Blockchain enabled secure pharmaceutical supply chain framework with traceability: an efficient searchable pharmachain approach. 13621-13641 - Essam H. Houssein, Mohammed R. Saad, Youcef Djenouri, Gang Hu, Abdelmgeid A. Ali, Hassan Shaban:

Metaheuristic algorithms and their applications in wireless sensor networks: review, open issues, and challenges. 13643-13673 - Pranav Shrivastava

, Bashir Alam, Mansaf Alam:
An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing. 13675-13691 - Yingying Ning, Jing Li, Ming Zhu, Chuanxi Liu:

Service selection based on blockchain smart contracts in cloud-edge environment. 13693-13715 - Yahya M. Tashtoush

, Moayyad Alajlouni, Firas Albalas, Omar A. Darwish:
Exploring low-level statistical features of n-grams in phishing URLs: a comparative analysis with high-level features. 13717-13736 - Nouha Arfaoui, Amel Ksibi, Nouf Abdullah Almujally

, Ridha Ejbali:
Empowering e-learning approach by the use of federated edge computing. 13737-13748 - Sangeeta Sharma, Priyanka Verma, Nitesh Bharot, Amish Ranpariya, Rakesh Porika:

PULSE: Proactive uncovering of latent severe anomalous events in IIoT using LSTM-RF model. 13749-13762 - Logesh Rajendran, Virendra Singh Shekhawat:

Deep Convolutional Neural Network with a Fuzzy (DCNN-F) technique for energy and time optimized scheduling of cloud computing. 13763-13775 - Adda Boualem

, Marwane Ayaida, Cyril de Runz, Hisham A. Kholidy, Hichem Sedjelmaci:
Sm-vsn-3c: a new Starlings model-based virtual sensor networks for coverage, connectivity, and data ccommunication. 13777-13793 - Xiaohui Huang, Junyang Wang, Yuan Jiang, Yuanchun Lan:

Multi-attention gated temporal graph convolution neural Network for traffic flow forecasting. 13795-13808 - Ankit Sharma

, Kriti Bhushan:
A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks. 13809-13834 - Rui Zhong, Yuefeng Xu

, Chao Zhang
, Jun Yu:
Leveraging large language model to generate a novel metaheuristic algorithm with CRISPE framework. 13835-13869 - Kashif Mehboob Khan, Junaid Arshad, Darakhshan Saleem, Mohammed Alsadi, Shabir Ahmad, Marvi Jokhio:

TruPro: a blockchain-based decentralised prosumer electricity trading platform for electrical vehicles (EVs). 13871-13896 - Ahmad Heydariyan, Farhad Soleimanian Gharehchopogh, Mohammad Reza Ebrahimi Dishabi:

A hybrid multi-objective algorithm based on slime mould algorithm and sine cosine algorithm for overlapping community detection in social networks. 13897-13917 - Akhil Chaurasia, Alok Kumar

, Udai Pratap Rao:
BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment. 13919-13944 - Shuhui Hao, Changcheng Huang, Ali Asghar Heidari, Huiling Chen, Guoxi Liang:

An improved weighted mean of vectors optimizer for multi-threshold image segmentation: case study of breast cancer. 13945-14004 - Gang Chen

, Hu Sun:
Multi-strategy improved sparrow search algorithm based on first definition of ellipse and group co-evolutionary mechanism for engineering optimization problems. 14005-14035 - Sushmita Sarkar, Vikas Srivastava

, Tapaswini Mohanty, Sumit Kumar Debnath
, Sihem Mesnager:
An efficient quantum oblivious transfer protocol. 14037-14048 - Seyed Hossein Seyed Ebrahimi

, Kambiz Majidzadeh
, Farhad Soleimanian Gharehchopogh
:
A principal label space transformation and ridge regression-based hybrid gorilla troops optimization and jellyfish search algorithm for multi-label classification. 14049-14093 - Amir Moradi, Fatemeh Rezaei:

Intelligent and efficient task caching for mobile edge computing. 14095-14112 - Maher Alharby, Ali Alssaiari

, Saad Alateef, Nigel Thomas, Aad van Moorsel:
A quantitative analysis of the security of PoW-based blockchains. 14113-14130 - Sourav

, Rifaqat Ali
:
Lattice-based ring signcryption scheme for smart healthcare management. 14131-14148 - Arezoo Ghasemi

, Amin Keshavarzi:
Energy-efficient virtual machine placement in heterogeneous cloud data centers: a clustering-enhanced multi-objective, multi-reward reinforcement learning approach. 14149-14166 - Huaiyu Guo, Donglin Zhu, Changjun Zhou, Chengye Zou:

DNA sequences design under many objective evolutionary algorithm. 14167-14183 - Boli Zheng

, Yi Chen, Chaofan Wang, Ali Asghar Heidari, Lei Liu
, Huiling Chen, Xiaowei Chen, Peirong Chen:
Stochastic biogeography-based learning improved RIME algorithm: application to image segmentation of lupus nephritis. 14185-14229 - Xiaoxiao Liu, Yan Zhao, Shigang Wang, Jian Wei:

G-SAM: GMM-based segment anything model for medical image classification and segmentation. 14231-14245 - Walid K. Ghamry, Suzan Shukry:

Channel estimation for RIS-aided MIMO systems in MmWave wireless communications with a few active elements. 14247-14267 - Lin-Tao Duan, Jin Wang, Hai-Ying Wang:

An energy-aware ant colony optimization strategy for virtual machine placement in cloud computing. 14269-14282 - Avuthu Avinash Reddy, Ramesh Babu Battula, Dinesh Gopalani:

Performance analysis of ML models on 5G sub-6 GHz bands: An experimental study. 14283-14294 - Behaylu Tadele Alemu

, Alemu Jorgi Muhammed, Habtamu Molla Belachew
, Mulatu Yirga Beyene:
A comprehensive detection and mitigation mechanism to protect SD-IoV systems against controller-targeted DDoS attacks. 14295-14313 - Essam H. Houssein, Marwa M. Emam, Narinder Singh, Nagwan M. Abdel Samee, Maali Alabdulhafith, Emre Çelik:

An improved honey badger algorithm for global optimization and multilevel thresholding segmentation: real case with brain tumor images. 14315-14364 - Essam H. Houssein, Asmaa Hammad, Nagwan M. Abdel Samee, Manal Abdullah Alohali, Abdelmgeid A. Ali:

TFCNN-BiGRU with self-attention mechanism for automatic human emotion recognition using multi-channel EEG data. 14365-14385 - Bhabani Sankar Samantray, K. Hemant Kumar Reddy:

Blockchain enabled secured, smart healthcare system for smart cities: a systematic review on architecture, technology, and service management. 14387-14415 - Bilal H. Abed-alguni

, Basil M. Alzboun, Noor Aldeen Alawad
:
BOC-PDO: an intrusion detection model using binary opposition cellular prairie dog optimization algorithm. 14417-14449 - Preetesh Purohit, Anuradha Purohit, Vrinda Tokekar:

Localization of try block and generation of catch block to handle exception using an improved LSTM. 14451-14468 - Chuan Li, Yanjie Zhu:

A hybrid butterfly and Newton-Raphson swarm intelligence algorithm based on opposition-based learning. 14469-14514 - Hong Huang, Yu Wang, Yue Cai, Hong Wang:

A novel approach for energy consumption management in cloud centers based on adaptive fuzzy neural systems. 14515-14538 - Feiyan Guo, Bing Tang, Ying Wang, Xiaoqing Luo:

Vehicle edge server deployment based on reinforcement learning in cloud-edge collaborative environment. 14539-14556 - Reham R. Mostafa

, Fatma A. Hashim, Amit Chhabra
, Ghaith Manita
, Yaning Xiao
:
Empowering bonobo optimizer for global optimization and cloud scheduling problem. 14557-14584 - Shabnam Bawa, Prashant Singh Rana, Rajkumar Tekchandani:

Migration of containers on the basis of load prediction with dynamic inertia weight based PSO algorithm. 14585-14609 - Mostafa Abodawood, Abeer Twakol Khalil, Hanan M. Amer, Mohamed Maher Ata:

Enhancing image encryption using chaotic maps: a multi-map approach for robust security and performance optimization. 14611-14635 - Amir Pakmehr, Andreas Aßmuth

, Negar Taheri, Ali Ghaffari:
DDoS attack detection techniques in IoT networks: a survey. 14637-14668 - Zhe Wang, Shuangbai He, Guoan Li:

Secure speech-recognition data transfer in the internet of things using a power system and a tried-and-true key generation technique. 14669-14684 - Xinyi Chen, Mengjian Zhang

, Ming Yang, Deguang Wang
:
A multi-strategy improved beluga whale optimization algorithm for constrained engineering problems. 14685-14727 - Mazahir Hussain, Buseung Cho:

HPTCollector: high-performance telemetry collector. 14729-14744 - Essam H. Houssein, Gaber M. Mohamed, Youcef Djenouri, Yaser Maher Wazery, Ibrahim A. Ibrahim

:
Nature inspired optimization algorithms for medical image segmentation: a comprehensive review. 14745-14766 - Mohamed A. Elseify, Salah Kamel, Loai Nasrat:

An improved moth flame optimization for optimal DG and battery energy storage allocation in distribution systems. 14767-14810 - Narender Reddy Kampelli, B. N. Bhandari:

A scalable and power efficient MAC protocol with adaptive TDMA for M2M communication. 14811-14834 - Arpita Srivastava, Ditipriya Sinha:

PSO-ACO-based bi-phase lightweight intrusion detection system combined with GA optimized ensemble classifiers. 14835-14890 - Jinge Shi, Yi Chen, Zhennao Cai, Ali Asghar Heidari, Huiling Chen, Qiuxiang He:

Multi-threshold image segmentation using a boosted whale optimization: case study of breast invasive ductal carcinomas. 14891-14949 - Sumit Sharma, Sarika Jain

:
OntoXAI: a semantic web rule language approach for explainable artificial intelligence. 14951-14975 - Jamil Alshaqsi

, Wenjia Wang
, Osama Drogham, Rami S. Alkhawaldeh
:
Quantitative and qualitative similarity measure for data clustering analysis. 14977-15002

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














