


default search action
Cluster Computing, Volume 26
Volume 26, Number 1, February 2023
- Li Quan:
Quality evaluation method of agricultural product packaging image based on structural similarity and MTF. 1-12 - Zongqu Zhao, Shaoti Ma
, Panke Qin:
Password authentication key exchange based on key consensus for IoT security. 1-12 - Ron C. Chiang:
Contention-aware container placement strategy for docker swarm with machine learning based clustering algorithms. 13-23 - Li Ruan, Yu Bai
, Shaoning Li, Shuibing He, Limin Xiao:
Workload time series prediction in storage systems: a deep learning based approach. 25-35 - Leonel Santos
, Ramiro Gonçalves, Carlos Rabadão
, José Martins
:
A flow-based intrusion detection framework for internet of things networks. 37-57 - Anwer Mustafa Hilal
, Manal Abdullah Alohali, Fahd N. Al-Wesabi, Nadhem Nemri
, Hasan J. Alyamani
, Deepak Gupta
:
Enhancing quality of experience in mobile edge computing using deep learning based data offloading and cyberattack detection technique. 59-70 - Romany Fouad Mansour
, Sayed Abdel-Khalek, Inès Hilali-Jaghdam, Jamel Nebhen
, Woong Cho, Gyanendra Prasad Joshi
:
An intelligent outlier detection with machine learning empowered big data analytics for mobile edge computing. 71-83 - Alain Bertrand Bomgni
, Garrik Brel Jagho Mdemaya, Hafiz Munsub Ali, David R. Gnimpieba Zanfack
, Etienne Z. Gnimpieba
:
ESPINA: efficient and secured protocol for emerging IoT network applications. 85-98 - Sardar Khaliq uz Zaman
, Ali Imran Jehangiri, Tahir Maqsood, Nuhman ul Haq
, Arif Iqbal Umar, Junaid Shuja
, Zulfiqar Ahmad
, Imed Ben Dhaou, Mohammed F. Alsharekh:
LiMPO: lightweight mobility prediction and offloading framework using machine learning for mobile edge computing. 99-117 - Anay Ghosh, Saiyed Umer
, Muhammad Khurram Khan
, Ranjeet Kumar Rout, Bibhas Chandra Dhara:
Smart sentiment analysis system for pain detection using cutting edge techniques in a smart healthcare framework. 119-135 - Abdullah Yousafzai
, Priyan Malarvizhi Kumar, Choong Seon Hong:
Blockchain-based incentive management framework for desktop clouds. 137-156 - Syed Muhammad Ammar Hassan Bukhari, Kashif Bilal, Aiman Erbad, Amr Mohamed, Mohsen Guizani:
Video transcoding at the edge: cost and feasibility perspective. 157-180 - Najmul Hassan
, Mohammad Aazam, Mohammad Tahir
, Kok-Lim Alvin Yau:
Floating Fog: extending fog computing to vast waters for aerial users. 181-195 - Muhammad Shafay
, Raja Wasim Ahmad, Khaled Salah, Ibrar Yaqoob
, Raja Jayaraman, Mohammed A. Omar:
Blockchain for deep learning: review and open challenges. 197-221 - Javid Ali, Tahir Maqsood
, Naima Khalid, Sajjad Ahmad Madani
:
Communication and aging aware application mapping for multicore based edge computing servers. 223-235 - Aqsa Rashid
, Asif Masood, Atta ur Rehman Khan
:
Zone of trust: blockchain assisted IoT authentication to support cross-communication between bubbles of trusted IoTs. 237-254 - Kamran Sattar Awaisi, Assad Abbas
, Hasan Ali Khattak
, Arsalan Ahmad
, Mazhar Ali, Abbas Khalid:
Deep reinforcement learning approach towards a smart parking architecture. 255-266 - Muhammad Yasir, Sardar Khaliq uz Zaman
, Tahir Maqsood
, Faisal Rehman
, Saad Mustafa
:
CoPUP: content popularity and user preferences aware content caching framework in mobile edge computing. 267-281 - Yan Zhao, Ning Hu, Yue Zhao, Zhihan Zhu:
A secure and flexible edge computing scheme for AI-driven industrial IoT. 283-301 - Ziyu Guo
, Yueming Lu, Huiping Tian, Jinxin Zuo, Hui Lu:
A security evaluation model for multi-source heterogeneous systems based on IOT and edge computing. 303-317 - Jiayu Sun, Huiqiang Wang, Guangsheng Feng
, Hongwu Lv, Jingyao Liu, Zihan Gao:
TOS-LRPLM: a task value-aware offloading scheme in IoT edge computing system. 319-335 - Jixun Gao, Rui Chang, Zhipeng Yang, Quanzheng Huang, Yuanyuan Zhao, Yu Wu
:
A task offloading algorithm for cloud-edge collaborative system based on Lyapunov optimization. 337-348 - Seunghyeon Shin, Mallika Boyapati, Kun Suo, Kyungtae Kang, Junggab Son
:
An empirical analysis of image augmentation against model inversion attack in federated learning. 349-366 - Amir Javadpour
, Pedro Pinto
, Forough Ja'fari, Weizhe Zhang:
DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments. 367-384 - Pedro González-Zamora
, Victor H. Benitez, Jesus Pacheco:
A feature-based processing framework for real-time implementation of muscle fatigue measurement. 385-394 - Pratima Sharma
, Rajni Jindal
, Malaya Dutta Borah:
A review of smart contract-based platforms, applications, and challenges. 395-421 - Lingyi Xu, Hefei Hu
, Yuanan Liu:
SFCSim: a network function virtualization resource allocation simulation platform. 423-436 - Ramin Mohammadi, Sedat Akleylek, Ali Ghaffari
, Alireza Shirmarz
:
Automatic delay-sensitive applications quality of service improvement with deep flows discrimination in software defined networks. 437-459 - Amir Javadpour, Forough Ja'fari, Pedro Pinto
, Weizhe Zhang:
Mapping and embedding infrastructure resource management in software defined networks. 461-475 - Anique Azhar, Saddaf Rubab
, Malik Murtaza Khan, Yawar Abbas Bangash, Mohammad Dahman Alshehri, Fizza Illahi, Ali Kashif Bashir:
Detection and prediction of traffic accidents using deep learning techniques. 477-493 - Mahdi Abbasi
, Azam Fazel Najafabadi, Seifeddine Ben Elghali
, Mohamed Zerrougui, Mohammad R. Khosravi, Habib Nasser
:
High-performance pseudo-anonymization of virtual power plant data on a CPU cluster. 495-512 - Mahdi Abbasi
, Azam Fazel Najafabadi, Seifeddine Ben Elghali, Mohamed Zerrougui, Mohammad R. Khosravi, Habib Nasser:
Correction to: High-performance pseudo-anonymization of virtual power plant data on a CPU cluster. 513 - Sakshi Srivastava
, Anil Kumar Singh:
Fraud detection in the distributed graph database. 515-537 - Mervat Hashem, Kenli Li, Ahmad Salah
:
PI-sqrt: novel parallel implementations of in-place sequence rotation on multicore systems. 539-557 - M. Jeyaselvi
, Rajesh Kumar Dhanaraj
, M. Sathya
, Fida Hussain Memon, Lalitha Krishnasamy
, Kapal Dev, Wang Ziyue, Nawab Muhammad Faseeh Qureshi
:
A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks. 559-574 - Romany Fouad Mansour
, Hesham Alhumyani, Sayed Abdel-Khalek, Rashid A. Saeed
, Deepak Gupta
:
Design of cultural emperor penguin optimizer for energy-efficient resource scheduling in green cloud computing environment. 575-586 - Nebojsa Bacanin
, Milos Antonijevic
, Timea Bezdan
, Miodrag Zivkovic
, K. Venkatachalam, Sharaf J. Malebary
:
Energy efficient offloading mechanism using particle swarm optimization in 5G enabled edge nodes. 587-598 - Arun Kumar Sangaiah
, Amir Javadpour, Forough Ja'fari, Pedro Pinto
, Weizhe Zhang, Sudha Balasubramanian:
A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things. 599-612 - Adeel Rafiq, Saad Rehman, Rupert C. D. Young, Wang-Cheol Song, Muhammad Attique Khan
, Seifedine Nimer Kadry, Gautam Srivastava
:
Knowledge defined networks on the edge for service function chaining and reactive traffic steering. 613-634 - Weipeng Jing, Xinyu Fu, Peng Liu
, Houbing Song
:
Joint resource trading and computation offloading in blockchain enhanced D2D-assisted mobile edge computing. 635-649 - Riman Mandal, Manash Kumar Mondal, Sourav Banerjee, Gautam Srivastava
, Waleed S. Alnumay, Uttam Ghosh, Utpal Biswas:
MECpVmS: an SLA aware energy-efficient virtual machine selection policy for green cloud computing. 651-665 - Mengyao Li, Rongbo Zhu
, Qianao Ding, Jun Wang, Shaohua Wan, Maode Ma:
Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter. 667-684 - Christiana Zaraket, Khalil Hariss, Sandro Ephrem, Maroun Chamoun, Tony Nicolas:
Design and realization of a secure multiplicative homomorphic encryption scheme for cloud services. 685-699 - Degan Zhang, Haoli Zhu
, Ting Zhang, Jie Zhang, Jinyu Du, Guoqiang Mao:
A new method of content distribution based on fuzzy logic and coalition graph games for VEC. 701-717 - Román Cárdenas
, Patricia Arroba, José L. Risco-Martín, José Manuel Moya
:
Modeling and simulation of smart grid-aware edge computing federations. 719-743 - Hadi Zavieh, Amir Javadpour, Yuan Li, Forough Ja'fari, Seyed Hadi Nasseri, Ali Shokouhi Rostami:
Task processing optimization using cuckoo particle swarm (CPS) algorithm in cloud computing infrastructure. 745-769 - Yanfei Lu, Dengyu Han, Xiaoxuan Wang
, Qinghe Gao:
Enhancing vehicular edge computing system through cooperative computation offloading. 771-788 - Abdelhamied A. Ateya, Ammar Muthanna, Andrey Koucheryavy, Yassine Maleh
, Ahmed A. Abd El-Latif
:
Energy efficient offloading scheme for MEC-based augmented reality system. 789-806 - Manas Ranjan Pradhan, Beenu Mago, Karamath Ateeq:
A classification-based sensor data processing method for the internet of things assimilated wearable sensor technology. 807-822 - M. Jalasri, L. Lakshmanan:
Managing data security in fog computing in IoT devices using noise framework encryption with power probabilistic clustering algorithm. 823-836 - Sakshi Garg, Deepti Mehrotra, Hari Mohan Pandey, Sujata Pandey:
Static to dynamic transition of RPL protocol from IoT to IoV in static and mobile environments. 847-862 - Sakshi Garg, Deepti Mehrotra, Hari Mohan Pandey, Sujata Pandey:
Correction: Static to dynamic transition of RPL protocol from IoT to IoV in static and mobile environments. 863
Volume 26, Number 2, April 2023
- Senthil Kumar Jagatheesaperumal
, Akhil Gupta
, Sudeep Tanwar
, Neeraj Kumar
, Sedat Akleylek:
Security enhancement in cellular networks employing D2D friendly jammer for V2V communication. 865-878 - Anusha Vangala, Ashok Kumar Das
, Vinay Chamola, Valery Korotaev, Joel J. P. C. Rodrigues:
Security in IoT-enabled smart agriculture: architecture, security solutions and challenges. 879-902 - Ashish Singh
, Kakali Chatterjee, Suresh Chandra Satapathy:
TrIDS: an intelligent behavioural trust based IDS for smart healthcare system. 903-925 - Yu-Chih Wei
, You-Xin Lai, Mu-En Wu:
An evaluation of deep learning models for chargeback Fraud detection in online games. 927-943 - Asad Ullah Khan, Nadeem Javaid
, Muhammad Asghar Khan, Insaf Ullah:
A blockchain scheme for authentication, data sharing and nonrepudiation to secure internet of wireless sensor things. 945-960 - Teng Zhan, Shiping Chen:
An improved hash algorithm for monitoring network traffic in the internet of things. 961-976 - Imtiaz Ali shah, Abid Mehmood
, Abdul Nasir Khan
, Mourad Elhadef, Atta ur Rehman Khan
:
HeuCrip: a malware detection approach for internet of battlefield things. 977-992 - Yann Brice Chebu Mtopi, Alain Bertrand Bomgni
, Hafiz Munsub Ali
, David R. Gnimpieba Zanfack
, Waleed Ejaz, Clémentin Tayou Djamégni, Etienne Zohim Gnimpieba
:
MultiHop optimal time complexity clustering for emerging IoT applications. 993-1009 - Shiyan Zhang
, Yuchao Zhang, Ran Wang, Xiangyang Gong:
MO-FreeVM: multi-objective server release algorithm for cluster resource management. 1011-1034 - Pramod Pavithran, Sheena Mathew, Suyel Namasudra, Ashish Singh:
Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine. 1035-1051 - Ehzaz Mustafa, Junaid Shuja
, Kashif Bilal, Saad Mustafa
, Tahir Maqsood, Faisal Rehman
, Atta ur Rehman Khan
:
Reinforcement learning for intelligent online computation offloading in wireless powered edge networks. 1053-1062 - Osama Daifallah Al-Khaleel
, Selçuk Baktir, Alptekin Küpçü
:
An ECC processor for IoT using Edwards curves and DFT modular multiplication. 1063-1075 - Foudil Mir
, Farid Meziane
:
DCOPA: a distributed clustering based on objects performances aggregation for hierarchical communications in IoT applications. 1077-1098 - Wenzhe Zhai, Mingliang Gao
, Alireza Souri
, Qilei Li
, Xiangyu Guo, Jianrun Shang, Guofeng Zou:
An attentive hierarchy ConvNet for crowd counting in smart city. 1099-1111 - Haythem Bany Salameh
, Haitham Moffaqq Al-Obiedollah, Marah Al-Hayek, Sharief Abdel-Razeq
, Ahmad F. Al-Ajlouni:
A two-dimensional OMA-NOMA user-pairing and power-minimization approach for opportunistic B5G-enabled IoT networks. 1113-1124 - Zhike Li
, Yong Wang:
An adaptive read/write optimized algorithm for Ceph heterogeneous systems via performance prediction and multi-attribute decision making. 1125-1146 - Asma Belhadi, Youcef Djenouri, Djamel Djenouri, Gautam Srivastava
, Jerry Chun-Wei Lin
:
Group intrusion detection in the Internet of Things using a hybrid recurrent neural network. 1147-1158 - Mohammad A. Alsmirat
, Yousef O. Sharrab, Monther Tarawneh
, Sana'a Al-shboul, Nabil J. Sarhan:
Video coding deep learning-based modeling for long life video streaming over next network generation. 1159-1167 - Leila Benarous
, Khedidja Benarous
, Ghulam Muhammad
, Zulfiqar Ali:
Deep learning application detecting SARS-CoV-2 key enzymes inhibitors. 1169-1180 - Vinayakumar Ravi
, Vasundhara Acharya, Mamoun Alazab:
A multichannel EfficientNet deep learning-based stacking ensemble approach for lung disease detection using chest X-ray images. 1181-1203 - Ashish Singh, Kakali Chatterjee:
Edge computing based secure health monitoring framework for electronic healthcare system. 1205-1220 - Puah Jia Hong, Muhammad Adeel Asghar, Amin Ullah, Mohammad Shorfuzzaman, Mehedi Masud, Raja Majid Mehmood
:
AI-based Bayesian inference scheme to recognize electroencephalogram signals for smart healthcare. 1221-1230 - Zengchen Yu
, Ke Wang, Zhibo Wan
, Shuxuan Xie, Zhihan Lv
:
Popular deep learning algorithms for disease prediction: a review. 1231-1251 - Zijian Zhou, Muhammad Adeel Asghar, Daniyal Nazir, Kamran Siddique, Mohammad Shorfuzzaman, Raja Majid Mehmood
:
An AI-empowered affect recognition model for healthcare and emotional well-being using physiological signals. 1253-1266 - Zhengqiang Yang, Yanling Zhang, Junwei Tian:
The effect of QoS and QoE requirements for designing task processing controller based on fuzzy logic on IoT environments. 1267-1283 - Tarek Kanan
, Ala Mughaid
, Riyad Al-Shalabi
, Mahmoud Al-Ayyoub, Mohammad W. Elbes, Odai Sadaqa:
Business intelligence using deep learning techniques for social media contents. 1285-1296 - Abdelmalek Bouguettaya
, Hafed Zarzour
, Ahmed Kechida, Amine Mohammed Taberkit:
A survey on deep learning-based identification of plant and crop diseases from UAV-based aerial images. 1297-1317 - Feiyan Guo, Bing Tang
, Mingdong Tang, Wei Liang:
Deep reinforcement learning-based microservice selection in mobile edge computing. 1319-1335 - Mohammad Almseidin
, Jamil Al-Sawwa, Mouhammd Alkasassbeh, Mohammed Alweshah:
On detecting distributed denial of service attacks using fuzzy inference system. 1337-1351 - Ayman M. Mansour, Mohammad A. Obeidat
, Bilal Hawashin
:
A novel multi agent recommender system for user interests extraction. 1353-1362 - Omar A. Alzubi
, Issa Qiqieh, Jafar Ahmad Abed Alzubi:
Fusion of deep learning based cyberattack detection and classification model for intelligent systems. 1363-1374 - Abdullah Alsalemi
, Abbes Amira, Hossein Malekmohamadi
, Kegong Diao:
Lightweight Gramian Angular Field classification for edge internet of energy applications. 1375-1387 - Lobna M. Abouelmagd
, Ashraf Darwish
, Václav Snásel, Aboul Ella Hassanien:
A pre-trained convolutional neural network with optimized capsule networks for chest X-rays COVID-19 diagnosis. 1389-1403 - Siham Zroug
, Ikram Remadna, Laïd Kahloul, Labib Sadek Terrissa, Saber Benharzallah:
Towards performance evaluation prediction in WSNs using artificial neural network multi-perceptron. 1405-1423 - Bushra Almas
, Hasan Mujtaba, Kifayat Ullah Khan
:
EHHR: an efficient evolutionary hyper-heuristic based recommender framework for short-text classifier selection. 1425-1446 - Wassila Lalouani
, Yi Dang, Mohamed Younis
:
Mitigating voltage fingerprint spoofing attacks on the controller area network bus. 1447-1460 - K. Muthamil Sudar
, P. Deepalakshmi, Ashish Singh
, Parvathaneni Naga Srinivasu
:
TFAD: TCP flooding attack detection in software-defined networking using proxy-based and machine learning-based mechanisms. 1461-1477 - Mehran Aghaei, Parvaneh Asghari
, Sepideh Adabi, Hamid Haj Seyyed Javadi:
Using recommender clustering to improve quality of services with sustainable virtual machines in cloud computing. 1479-1493 - Chen Ling, Weizhe Zhang
, Hui He:
K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing. 1495-1510 - Ehsan Gorjian Mehlabani, Chongqi Zhang:
Improving virtualization and migration in combinatorial dynamic mapping for cloud services. 1511-1533 - Nilayam Kumar Kamila, Subhendu Kumar Pani, Rashmi Das, P. K. Bharti, Hamid Esmaeili Najafabadi
, Mehdi Gheisari
, Yang Liu
:
A near-optimal & load balanced resilient system design for high-performance computing platform. 1535-1550 - Seyed Nima Khezr
, Abdulsalam Yassine, Rachid Benlamri:
Towards a secure and dependable IoT data monetization using blockchain and fog computing. 1551-1564 - Zahra Amiri, Arash Heidari
, Nima Jafari Navimipour
, Mehmet Unal:
Resilient and dependability management in distributed environments: a systematic and comprehensive literature review. 1565-1600 - Shaoxi Li, Jing Liu
:
A novel design of a dependable and fault-tolerant multi-layer banyan network based on a crossbar switch for nano communication. 1601-1609 - N. Suresh Kumar
, G. Santhosh Kumar:
Abstracting IoT protocols using timed process algebra and SPIN model checker. 1611-1629 - Naveed Islam, Khalid Haseeb, Amjad Rehman
, Teg Alam, Gwanggil Jeon
:
An adaptive and secure routes migration model for the sustainable cloud of things. 1631-1642 - Sonia Bashir, Saad Mustafa
, Raja Wasim Ahmad, Junaid Shuja
, Tahir Maqsood, Abdullah Alourani
:
Multi-factor nature inspired SLA-aware energy efficient resource management for cloud environments. 1643-1658 - P. Keerthi Chandrika, Mahammad Shareef Mekala, Gautam Srivastava
:
Edge resource slicing approaches for latency optimization in AI-edge orchestration. 1659-1683 - Rachid EL Mokadem
, Yann Ben Maissa, Zineb El Akkaoui:
Federated learning for energy constrained devices: a systematic mapping study. 1685-1708
Volume 26, Number 3, June 2023
- Omar Darwish, Yahya M. Tashtoush
, Amjad Bashayreh, Alaa Alomar, Shahed Alkhaza'leh
, Dirar A. Darweesh
:
A survey of uncover misleading and cyberbullying on social media for public health. 1709-1735 - Naqin Zhou, Weiwei Lin
, Wei Feng, Fang Shi, Xiongwen Pang:
Budget-deadline constrained approach for scientific workflows scheduling in a cloud environment. 1737-1751 - Weiwei Lin
, Haojun Xu
, Jianzhuo Li, Ziming Wu, Zhengyang Hu, Victor Chang, James Z. Wang:
Deep-profiling: a deep neural network model for scholarly Web user profiling. 1753-1766 - Benyamin T. Tabarsi
, Ali Rezaee
, Ali Movaghar:
ROGI: Partial Computation Offloading and Resource Allocation in the Fog-Based IoT Network Towards Optimizing Latency and Power Consumption. 1767-1784 - Chengxi Jiang, Shijie Xu
, Guanggang Geng, Jian Weng
, Xinchang Zhang:
Seq2Path: a sequence-to-path-based flow feature fusion approach for encrypted traffic classification. 1785-1800 - Nenavath Chander
, Mummadi Upendra Kumar:
Metaheuristic feature selection with deep learning enabled cascaded recurrent neural network for anomaly detection in Industrial Internet of Things environment. 1801-1819 - Mohammed Azmi Al-Betar
, Mohammed A. Awadallah, Iyad Abu Doush, Osama Ahmad Alomari
, Ammar Kamal Abasi, Sharif Naser Makhadmeh, Zaid Abdi Alkareem Alyasseri:
Boosting the training of neural networks through hybrid metaheuristics. 1821-1843 - Avita Katal
, Susheela Dahiya, Tanupriya Choudhury
:
Energy efficiency in cloud computing data centers: a survey on software technologies. 1845-1875 - Zahida Tchantchane
, Khadidja Bouhadja, Ouahiba Azouaoui, Nassira Ghoualmi-Zine
:
Enhanced unstructured points cloud subdivision applied for parallel Delaunay triangulation. 1877-1889 - Uluer Emre Özdil
, Serkan Ayvaz
:
An experimental and comparative benchmark study examining resource utilization in managed Hadoop context. 1891-1915 - Sharu Bansal
, Dilip Kumar
:
Enhancing constrained application protocol using message options for internet of things. 1917-1934 - Cristian Cardas, José F. Aldana-Martín
, Antonio M. Burgueño-Romero
, Antonio J. Nebro, Jose Manuel Mateos, Juan Jesús Sánchez Sánchez:
On the performance of SQL scalable systems on Kubernetes: a comparative study. 1935-1947 - Yelleti Vivek
, Vadlamani Ravi
, P. Radha Krishna:
Scalable feature subset selection for big data using parallel hybrid evolutionary algorithm based wrapper under apache spark environment. 1949-1983 - Zuhal Ozturk, Haluk Rahmi Topcuoglu
, Mahmut Taylan Kandemir:
Quantifying the impact of data replication on error propagation. 1985-1999 - Guiliang Xie, Wei Zhang
, Zhi Hu, Gaojian Li:
Upper confident bound advantage function proximal policy optimization. 2001-2010 - Xinyang Wang, Yu Sun, Qiao Sun, Weiwei Lin, James Z. Wang, Wei Li:
HCIndex: a Hilbert-Curve-based clustering index for efficient multi-dimensional queries for cloud storage systems. 2011-2025 - Saeid Alirezazadeh
, Luís A. Alexandre:
Improving makespan in dynamic task scheduling for cloud robotic systems with time window constraints. 2027-2045 - Arun Kumar Yadav
, Ram Shringar Raw
, Rajendra Kumar Bharti
:
DPC2-CD: a secure architecture and methods for distributed processing and concurrency control in cloud databases. 2047-2068 - (Withdrawn) Real-time network virtualization based on SDN and Docker container. 2069-2083
- Anwer Mustafa Hilal
, Shaha T. Al-Otaibi, Hany Mahgoub, Fahd N. Al-Wesabi, Ghadah Aldehim
, Abdelwahed Motwakel
, Mohammed Rizwanullah, Ishfaq Yaseen:
Deep learning enabled class imbalance with sand piper optimization based intrusion detection for secure cyber physical systems. 2085-2098
Volume 26, Number 4, August 2023
- Fausto Spoto, Sara Migliorini
, Mauro Gambini, Andrea Benini
:
On the use of generic types for smart contracts. 2099-2113 - Stefano Momo Loss
, Har Preet Singh, Nélio Cacho, Frederico Lopes:
Using FIWARE and blockchain in smart cities solutions. 2115-2128 - Michael Sober
, Marten Sigwart, Philipp Frauenthaler, Christof Spanring, Max Kobelt, Stefan Schulte:
Decentralized cross-blockchain asset transfers with transfer confirmation. 2129-2146 - Janka Hartmann, Omar Hasan
:
Privacy considerations for a decentralized finance (DeFi) loans platform. 2147-2161 - Yuvaraj Rajendra
, Sachin Sahu, Venkatesan Subramanian, Sandeep Kumar Shukla:
Storage efficient blockchain models for constrained applications. 2163-2181 - Vijak Sethaput
, Supachate Innet:
Blockchain application for central bank digital currencies (CBDC). 2183-2197 - Ishaani Priyadarshini, Rohit Sharma
, Dhowmya Bhatt, Mohammed S. Al-Numay
:
Human activity recognition in cyber-physical systems using optimized machine learning techniques. 2199-2215 - Erukala Suresh Babu
, B. V. RamNaresh Yadav, A. Kousar Nikhath, Soumya Ranjan Nayak
, Waleed S. Alnumay
:
MediBlocks: secure exchanging of electronic health records (EHRs) using trust-based blockchain network with privacy concerns. 2217-2244 - Ala' A. Eshmawi, Mashael M. Khayyat, Sayed Abdel-Khalek, Romany Fouad Mansour
, Umesh Dwivedi, Krishna Kumar joshi, Deepak Gupta
:
Deep learning with metaheuristics based data sensing and encoding scheme for secure cyber physical sensor systems. 2245-2257 - Sunil Pattepu, Amrit Mukherjee
, Sidheswar Routray
, Proshikshya Mukherjee, Yinan Qi, Amlan Datta:
Multi-antenna relay based cyber-physical systems in smart-healthcare NTNs: an explainable AI approach. 2259-2269 - Anichur Rahman
, Md. Sazzad Hossain, Ghulam Muhammad
, Dipanjali Kundu, Tanoy Debnath, M. Sohel Rahman, Md. Saikat Islam Khan, Prayag Tiwari
, Shahab S. Band:
Federated learning-based AI approaches in smart healthcare: concepts, taxonomies, challenges and open issues. 2271-2311 - Youcef Djenouri, Asma Belhadi, Gautam Srivastava, Jerry Chun-Wei Lin
:
When explainable AI meets IoT applications for supervised learning. 2313-2323 - L. Sathish Kumar, Sidheswar Routray
, A. V. Prabu, Rajasoundaran Soundararajan, V. Pandimurugan
, Amrit Mukherjee
, Mohammed S. Al-Numay
:
Artificial intelligence based health indicator extraction and disease symptoms identification using medical hypothesis models. 2325-2337 - Amit Kumar Mishra
, Shweta Paliwal
:
Mitigating cyber threats through integration of feature selection and stacking ensemble learning: the LGBM and random forest intrusion detection perspective. 2339-2350 - Devisha Tiwari, Bhaskar Mondal
, Sunil Kumar Singh, Deepika Koundal
:
Lightweight encryption for privacy protection of data transmission in cyber physical systems. 2351-2365 - Lokesh Malviya, Sandip Mal
:
CIS feature selection based dynamic ensemble selection model for human stress detection from EEG signals. 2367-2381 - Raja Wasim Ahmad, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob
, Samer Ellahham, Mohammed A. Omar:
Blockchain and COVID-19 pandemic: applications and challenges. 2383-2408 - Sivaselvan N
, Vivekananda Bhat K.
, Muttukrishnan Rajarajan, Ashok Kumar Das, Joel J. P. C. Rodrigues:
SUACC-IoT: secure unified authentication and access control system based on capability for IoT. 2409-2428 - Faisal Kiyani, Kashif Naseer Qureshi, Kayhan Zrar Ghafoor, Gwanggil Jeon
:
ISDA-BAN: interoperability and security based data authentication scheme for body area network. 2429-2442 - Mohammad Shirafkan, Ali Shahidinejad
, Mostafa Ghobaei-Arani
:
An Intrusion Detection System using Deep Cellular Learning Automata and Semantic Hierarchy for Enhancing RPL Protocol Security. 2443-2461 - (Withdrawn) RETRACTED ARTICLE: Lightweight security scheme for data management in E-commerce platform using dynamic data management using blockchain model. 2463
- (Withdrawn) RETRACTED ARTICLE: A novel approach to QoS-aware resource allocation in NOMA cellular HetNets using multi-layer optimization. 2465
Volume 26, Number 5, October 2023
- Yuan Song, Wenchang Shi, Bo Qin, Bin Liang:
A collective attestation scheme towards cloud system. 2467-2478 - Xueliang Fu, Yang Sun
, Haifang Wang, Honghui Li:
Task scheduling of cloud computing based on hybrid particle swarm algorithm and genetic algorithm. 2479-2488 - Alaa Alhowaide
, Izzat Alsmadi, Jian Tang:
Towards the design of real-time autonomous IoT NIDS. 2489-2502 - Weilian Liu:
Smart sensors, sensing mechanisms and platforms of sustainable smart agriculture realized through the big data analysis. 2503-2517 - Muhammad Usman Sana, Zhanli Li, Fawad Javaid
, Muhammad Wahab Hanif
, Imran Ashraf:
Improved particle swarm optimization based on blockchain mechanism for flexible job shop problem. 2519-2537 - Yoosang Park, Raehyun Kim
, Thi My Tuyen Nguyen
, Jaeyoung Choi
:
Improving blocked matrix-matrix multiplication routine by utilizing AVX-512 instructions on intel knights landing and xeon scalable processors. 2539-2549 - Yunjae Lee, Heon Y. Yeom, Hyuck Han
:
APR: adaptive page replacement scheme for scientific applications. 2551-2562 - Jueon Park, Kyungyong Lee
:
S-MPEC: Sparse Matrix Multiplication Performance Estimator on a Cloud Environment. 2563-2576 - Sejin Kim, Yoonhee Kim
:
Interference-aware execution framework with Co-scheML on GPU clusters. 2577-2589 - Yeonwoo Jeong
, Khan Esrat Maria, Sungyong Park
:
Towards energy-efficient service scheduling in federated edge clouds. 2591-2603 - Abbas Jafar
, Myungho Lee
:
High-speed hyperparameter optimization for deep ResNet models in image recognition. 2605-2613 - Jaehyun Han, Guangyu Zhu, Eunseo Lee, Yongseok Son
:
Design and implementation of an efficient and parallel bad block checker for parallelism of storage devices. 2615-2627 - Hyunjoon Cheon, Jinseung Ryu, Jaecheol Ryou, Chan Yeol Park, Yo-Sub Han
:
ARED: automata-based runtime estimation for distributed systems using deep learning. 2629-2641 - Cheongjun Lee, Jaehwan Lee
, Donghun Koo, Chungyong Kim, Jiwoo Bang, Eun-Kyu Byun, Hyeonsang Eom:
Towards enhanced I/O performance of a highly integrated many-core processor by empirical analysis. 2643-2655 - Saurabh Shukla
, Mohd. Fadzil Hassan
, Tran Duc Chung
, Rehan Akbar, Irving Vitra Paputungan, Muhammad Khalid Khan:
Improving latency in Internet-of-Things and cloud computing for real-time data transmission: a systematic literature review (SLR). 2657-2680 - Zuqiang Ke
, Nohpill Park:
Performance modeling and analysis of Hyperledger Fabric. 2681-2699 - Marco Crosara
, Luca Olivieri
, Fausto Spoto
, Fabio Tagliaferro
:
Fungible and non-fungible tokens with snapshots in Java. 2701-2718 - Greeshma Lingam:
Reinforcement learning based energy efficient resource allocation strategy of MapReduce jobs with deadline constraint. 2719-2735 - Hui Dou, Kang Wang, Yiwen Zhang
, Pengfei Chen:
ATConf: auto-tuning high dimensional configuration parameters for big data processing frameworks. 2737-2755 - Vincenzo Eduardo Padulano
, Enric Tejedor Saavedra, Pedro Alonso-Jordá, Javier López-Gómez, Jakob Blomer:
A caching mechanism to exploit object store speed in High Energy Physics analysis. 2757-2772 - Suyeon Lee, Yeonwoo Jeong
, Kyuli Park, Gyeonghwan Jung, Sungyong Park
:
zStream: towards a low latency micro-batch streaming system. 2773-2787 - Abeer Abdel Khaleq, Ilkyeun Ra:
Intelligent microservices autoscaling module using reinforcement learning. 2789-2800 - Jongbeen Han
, Hyeonsang Eom, Yongseok Son:
Design and implementation of an efficient VM scheduling framework for interactive streaming service. 2801-2814 - Jose González-Abad
, Álvaro López García
, Valentin Y. Kozlov
:
A container-based workflow for distributed training of deep learning algorithms in HPC clusters. 2815-2834 - Jake Choi, Heon Young Yeom, Yoonhee Kim:
Improving Oversubscribed GPU Memory Performance in the PyTorch Framework. 2835-2850 - Seoungbeom Heo, Dae-Cheol Kang, Hyeounji Jang, Hyeock-Jin Lee, Minkyoung Cho, Jik-Soo Kim
:
Comprehensive techniques for multi-tenant deep learning framework on a Hadoop YARN cluster. 2851-2864 - Safdar Jamil, Abdul Salam, Awais Khan
, Bernd Burgstaller, Sung-Soon Park, Youngjae Kim:
Scalable NUMA-aware persistent B+-tree for non-volatile memory devices. 2865-2881 - Cheongjun Lee, Jaehwan Lee
, Chungyong Kim, Jiwoo Bang, Eun-Kyu Byun, Hyeonsang Eom:
I/O separation scheme on Lustre metadata server based on multi-stream SSD. 2883-2896 - Yifan Chen, Shaomiao Chen, Kuan-Ching Li
, Wei Liang, Zhiyong Li:
DRJOA: intelligent resource management optimization through deep reinforcement learning approach in edge computing. 2897-2911 - Yuanchao Hu, Tao Huang, Yang Yu, Yunzhu An
, Mengdan Cheng, Wen Zhou, Wentao Xian:
An energy-aware service placement strategy using hybrid meta-heuristic algorithm in iot environments. 2913-2919 - Tanzila Saba, Amjad Rehman
, Khalid Haseeb, Teg Alam, Gwanggil Jeon
:
Cloud-edge load balancing distributed protocol for IoE services using swarm intelligence. 2921-2931 - Hongyu Wang, Ying Li, Songtao Ding, Xiaoying Pan, Zhanyi Gao, Shaohua Wan, Jun Feng:
Adaptive denoising for magnetic resonance image based on nonlocal structural similarity and low-rank sparse representation. 2933-2946 - Thierno Gueye, Yanen Wang, Mudassar Rehman
, Ray Tahir Mushtaq
, Sadaf Zahoor:
A novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learning. 2947-2973 - Thierno Gueye, Yanen Wang, Mudassar Rehman, Ray Tahir Mushtaq
, Sadaf Zahoor:
Correction to: a novel method to detect cyber-attacks in IoT/IIoT devices on the modbus protocol using deep learning. 2975 - Abdul Basit, Waqas Tariq Toor, Muhammad Saadi
, Naeem Maroof, Saqib Ali Khan, Sattam Al Otaibi:
Reversible encryption and lossless data hiding for medical imaging aiding smart health care. 2977-2991 - Géraldine André, Bruno Bachelet, Pietro Battistoni
, Amina Belhassena, Sandro Bimonte, Christophe Cariou
, Frederic Chabot, Gérard Chalhoub, Adrian Couvent, Georgia Garani, Jean Laneurit, Rim Moussa, Konstantinos Oikonomou, Ibrahim Sammour, Monica Sebillo, Mateus Vilela Souza, Nicolas Tricot, Robert Wrembel:
LambdAgrIoT: a new architecture for agricultural autonomous robots' scheduling: from design to experiments. 2993-3015 - Yun Xie
, Peng Li, Nadia Nedjah, Brij B. Gupta
, David Taniar, Jindan Zhang:
Privacy protection framework for face recognition in edge-based Internet of Things. 3017-3035 - Farida Siddiqi Prity, Md. Hasan Gazi, K. M. Aslam Uddin
:
A review of task scheduling in cloud computing based on nature-inspired optimization algorithm. 3037-3067 - Karima Saidi
, Dalal Bardou:
Task scheduling and VM placement to resource allocation in Cloud computing: challenges and opportunities. 3069-3087 - Roya Taheri, Habib Ahmed, Engin Arslan:
Deep learning for the security of software-defined networks: a review. 3089-3112 - Sanaz Taheri-abed, Amir-Masoud Eftekhari-Moghadam, Mohammad Hossein Rezvani
:
Machine learning-based computation offloading in edge and fog: a systematic review. 3113-3144 - Heba Abdel-Nabi
, Mostafa Z. Ali, Arafat Awajan, Mohammad I. Daoud, Rami Alazrai
, Ponnuthurai N. Suganthan, Talal Ali:
A comprehensive review of the deep learning-based tumor analysis approaches in histopathological images: segmentation, classification and multi-learning tasks. 3145-3185 - Sepideh Ebneyousef, Alireza Shirmarz
:
A taxonomy of load balancing algorithms and approaches in fog computing: a survey. 3187-3208 - Shobhana Kashyap
, Avtar Singh
:
Prediction-based scheduling techniques for cloud data center's workload: a systematic review. 3209-3235 - Bahareh Bahrami
, Mohammad Reza Khayyambashi, Seyedali Mirjalili
:
Edge server placement problem in multi-access edge computing environment: models, techniques, and applications. 3237-3262 - Munish Kumar, Cheemaladinne Kondaiah, Alwyn Roshan Pais, Routhu Srinivasa Rao
:
Machine learning models for phishing detection from TLS traffic. 3263-3277 - M. P. G. K. Jayaweera, W. M. C. J. T. Kithulwatta, R. M. K. T. Rathnayaka:
Detect anomalies in cloud platforms by using network data: a review. 3279-3289 - Wimalyn Bovenizer, Paitoon Chetthamrongchai:
A comprehensive systematic and bibliometric review of the IoT-based healthcare systems. 3291-3317 - Wei Li, Junqing Yuan
, Qiaoyong Jiang, Qingzheng Xu, Lei Wang:
A multiobjective decomposition evolutionary algorithm with optimal history-based neighborhood adaptation and a dual-indicator selection strategy. 3319-3339 - Jianli Liu, Yu Zhang, Bei Gong:
A data compression and encryption method for green edge computing. 3341-3359
Volume 26, Number 6, December 2023
- Zainab Iftikhar
, Adeel Anjum, Abid Khan
, Munam Ali Shah, Gwanggil Jeon:
Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger. 3361-3377 - Zainab Iftikhar, Adeel Anjum, Abid Khan, Munam Ali Shah, Gwanggil Jeon:
Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger. 3379 - Neeta Alange, P. Vidya Sagar
:
Small files access efficiency in hadoop distributed file system a case study performed on British library text files. 3381-3388 - Abbas Yazdinejad, Elnaz Rabieinejad, Tahereh Hasani, Gautam Srivastava:
A BERT-based recommender system for secure blockchain-based cyber physical drug supply chain management. 3389-3403 - Abbas Yazdinejad, Elnaz Rabieinejad, Tahereh Hasani, Gautam Srivastava:
Correction: A BERT-based recommender system for secure blockchain-based cyber physical drug supply chain management. 3405 - Serhan Gener, Parker Dattilo, Dhruv Gajaria, Alexander Fusco, Ali Akoglu
:
Gpu-based and streaming-enabled implementation of pre-processing flow towards enhancing optical character recognition accuracy and efficiency. 3407-3419 - Muna Al-Hawawreh
, Ahamed Aljuhani, Yaser Jararweh:
Chatgpt for cybersecurity: practical applications, challenges, and future directions. 3421-3436 - An Chi Huang, Sheng Hui Meng, Tian Jiun Huang:
A survey on machine and deep learning in semiconductor industry: methods, opportunities, and challenges. 3437-3472 - Ruchika Malhotra, Bhawna Jain
, Marouane Kessentini:
Examining deep learning's capability to spot code smells: a systematic literature review. 3473-3501 - Saad Ahmad Khan, Muhammad Abdullah
, Waheed Iqbal, Muhammad Arif Butt:
Efficient job placement using two-way offloading technique over fog-cloud architectures. 3503-3521 - Michael Sober, Giulia Scaffino, Stefan Schulte, Salil S. Kanhere
:
A blockchain-based IoT data marketplace. 3523-3545 - Sheetal Garg
, Rohit Ahuja, Raman Singh
, Ivan Perl:
GMM-LSTM: a component driven resource utilization prediction model leveraging LSTM and gaussian mixture model. 3547-3563 - Mohammadreza Ipchi Sheshgelani, Saeid Pashazadeh
, Pedram Salehpoor:
Cooperative hybrid consensus with function optimization for blockchain. 3565-3576 - Zhao Deng, Guoming Lu:
Intelligent control method of main road traffic flow based on multi-sensor information fusion. 3577-3586 - Richa Jain
, Neelam Sharma:
A quantum inspired hybrid SSA-GWO algorithm for SLA based task scheduling to improve QoS parameter in cloud computing. 3587-3610 - Danial Bakhshayeshi Avval, Pouria Ouni Heris, Nima Jafari Navimipour
, Behnaz Mohammadi, Senay Yalçin:
A new QoS-aware method for production scheduling in the industrial internet of things using elephant herding optimization algorithm. 3611-3626 - Mengqi Liu, Kunshu Wang, Tiegang Gao:
High-capacity reversible data hiding in encrypted images based on adaptive arithmetic coding and static Huffman coding. 3627-3645 - Hong Chen, Yiguo Xue, Daohong Qiu:
Numerical simulation of the land subsidence induced by groundwater mining. 3647-3656 - Madhusudan G. Lanjewar
, Jivan Parab, Arman Yusuf Shaikh, Marlon Sequeira
:
CNN with machine learning approaches using ExtraTreesClassifier and MRMR feature selection techniques to detect liver diseases on cloud. 3657-3672 - Pranav Shrivastava
, Bashir Alam, Mansaf Alam:
Security enhancement using blockchain based modified infinite chaotic elliptic cryptography in cloud. 3673-3688 - Bing Tang
, Jincheng Luo, Mohammad S. Obaidat, Pandi Vijayakumar:
Container-based task scheduling in cloud-edge collaborative environment using priority-aware greedy strategy. 3689-3705 - Linya Cai:
Decision-making of transportation vehicle routing based on particle swarm optimization algorithm in logistics distribution management. 3707-3718 - Farah Jemili
:
Intelligent intrusion detection based on fuzzy Big Data classification. 3719-3736 - Gagandeep Kaur
, Sindhu Hak Gupta
, Harleen Kaur:
Performance evaluation and optimization of long range IoT network using whale optimization algorithm. 3737-3751 - Arash Heidari
, Mohammad Ali Jabraeil Jamali
:
Internet of Things intrusion detection systems: a comprehensive review and future directions. 3753-3780 - Hengxiang Yang, Lumin Li, Kai Li:
Real-time progressive compression method of massive data based on improved clustering algorithm. 3781-3791 - Zaid Albataineh
, Nebal Al-Zoubi, Ahmed Musa:
Channel estimation for massive MIMO system using the shannon entropy function. 3793-3801 - Sudheer Mangalampalli
, Ganesh Reddy Karri
, Mohit Kumar
:
Multi objective task scheduling algorithm in cloud computing using grey wolf optimization. 3803-3822 - Jian Yu
, Zhixing Lin, Qiong Yu, Xiangmei Xiao:
QoS correlation-based service composition algorithm for multi-constraint optimal path selection. 3823-3837 - Zhiqiang Wang, Wenjing Gao
, Ming Yang, Rong Hao:
Enabling Secure Data sharing with data deduplication and sensitive information hiding in cloud-assisted Electronic Medical Systems. 3839-3854 - Arezoo Ghasemi, Abolfazl Toroghi Haghighat, Amin Keshavarzi:
Enhanced multi-objective virtual machine replacement in cloud data centers: combinations of fuzzy logic with reinforcement learning and biogeography-based optimization algorithms. 3855-3868 - Abhinav Tomar
, Rakesh Ranjan Kumar, Indrajeet Gupta:
Decision making for cloud service selection: a novel and hybrid MCDM approach. 3869-3887 - Farid Bavifard, Mohammad Kheyrandish
, Mohammad Mosleh:
A new approach based on game theory to reflect meta-cluster dependencies into VoIP attack detection using ensemble clustering. 3889-3906 - Robin Singh Bhadoria
, Naman Bhoj, Manoj Kumar Srivastav
, Rahul Kumar
, Balasubramanian Raman
:
A machine learning framework for security and privacy issues in building trust for social networking. 3907-3930 - Qi Tao
, Xiaohui Cui:
B-FLACS: blockchain-based flexible lightweight access control scheme for data sharing in cloud. 3931-3941 - Jan Bielecki
, Michal Smialek
:
Estimation of execution time for computing tasks. 3943-3956 - Zahra Katebi, Mohammad Nassiri
, Mohsen Rezvani:
XACSim: a new tool for measuring similarity of XACML security policies. 3957-3972 - Yifeng Liu, Eyhab Al-Masri:
Slow Subscribers: a novel IoT-MQTT based denial of service attack. 3973-3984 - Natheer Khasawneh, Mohammad Fraiwan, Luay Fraiwan
:
Detection of K-complexes in EEG signals using deep transfer learning and YOLOv3. 3985-3995 - Mehdi Boulaiche
, Mohamed F. Younis:
A multi-illusive voids approach for increasing base station anonymity. 3997-4013 - Jinjiang Wang, Junyang Yu
, Yixin Song, Xin He, Yalin Song:
An efficient energy-aware and service quality improvement strategy applied in cloud computing. 4031-4049 - Hongjian Li
, Peng Zheng, Tiantian Wang, Jingjing Wang, Tongming Liu:
A multi-objective task offloading based on BBO algorithm under deadline constrain in mobile edge computing. 4051-4067 - Chaimae Hazman, Azidine Guezzaz, Said Benkirane, Mourade Azrour
:
lIDS-SIoEL: intrusion detection framework for IoT-based smart environments security using ensemble learning. 4069-4083 - Chunlin Li, Yong Zhang, Youlong Luo:
Controller deployment based on network partition and collaborative scheduling on MEC. 4085-4099 - N. Sheena
, Shelbi Joseph, Shailesh Sivan, Bharat Bhushan:
Light-weight privacy enabled topology establishment and communication protocol for swarm IoT networks. 4101-4117 - Shikha Rastogi, Jaspreet Singh
:
Performance enhancement of vision based fall detection using ensemble of machine learning model. 4119-4132 - Fatma Altuntas, Mehmet Sahin Gök
:
A data-driven analysis of renewable energy management: a case study of wind energy technology. 4133-4152 - Retraction Note: Discrete Noetherian ring variational pattern feature sets for space-air-ground network protocol monitoring. 4153
- Retraction Note: Unsaturated dynamic constitutive model under cyclic loading. 4155

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.