


default search action
Cluster Computing, Volume 28
Volume 28, Number 1, February 2025
- Mahmoud E. Farfoura, Ibrahim Mashal, Ahmad Alkhatib, Radwan M. Batyha:
A lightweight machine learning methods for malware classification. 1 - Yezhou Zhang
, Lang Li
, Yu Ou:
BPPF: a bilinear plaintext-power fusion method for enhanced profiling side-channel analysis. 2 - Sunil Prajapat, Dheeraj Kumar, Pankaj Kumar:
Quantum image encryption protocol for secure communication in healthcare networks. 3 - Manish Kumar, Sunggon Kim:
Augmented access pattern-based I/O performance prediction using directed acyclic graph regression. 4 - Sunil Prajapat, Neeraj Kumar, Ashok Kumar Das, Pankaj Kumar, Rifaqat Ali:
Quantum-safe blockchain-assisted data encryption protocol for internet of things networks. 5 - Jaya Dofe, Shailesh Rajput:
Protecting against modeling attacks: design and analysis of lightweight dynamic physical unclonable function. 6 - Gabriel Araújo, Rayner Sousa, Iure Fé, Paulo A. L. Rego, Francisco Airton Silva:
Network service function chaining: a performance study varying topologies. 7 - Lujie Wang, Zhong Chen, Xiyu Sun, Chenchen He:
Region of interest encryption algorithm for images based on lifting scheme and object detection. 8 - Nan Li, Qianqian Su:
An efficient position-sensitive fuzzy keyword search scheme for encrypted data on hybrid cloud. 9 - Guodong Ye, Zhuozhao Chen:
Authenticated reversible image hiding algorithm based on blockchain technology. 10 - Nguyen Tan Cam, Tran Duc Viet:
uitSDD: Protect software defined networks from distributed denial-of-service using multi machine learning models. 11 - Willian Barreiros, Jun Kong, Renato Ferreira, George Teodoro:
A hierarchical data partitioning strategy for irregular applications: a case study in digital pathology. 12 - Ardalan Ghasemzadeh, Hadi S. Aghdasi, Saeed Saeedvand:
Optimizing edge server placement and allocation for enhanced energy efficiency: a multi-objective approach based on decision space and elitism. 13 - Zeng Gao, Yi Zhuang, Jingjing Gu:
Multi-strategy arithmetic optimization algorithm for global optimization and uncertain motion tracking. 14 - Rong Gao, Zhiwei Chen, Xinyun Wu, Yonghong Yu, Li Zhang:
Dynamic deep graph convolution with enhanced transformer networks for time series anomaly detection in IoT. 15 - G. Punnam Chander, Sujit Das:
A hybrid decision support system in medical emergencies using artificial neural network and hyperbolic secant grey wolf optimization techniques. 43 - Yong He, Mingran Wang:
Dynamic step opposition-based learning sparrow search algorithm for UAV path planning. 44 - Riham Elsaadany, Guy Bégin:
An auto-scaling multi-tiered node-organizing blockchain design model for the internet of things. 45 - Leda Qu, Feng Wen, Haixin Huang, Zhuo Wang:
Aggregation-chain: a consortium blockchain based multi-chain data sharing framework with efficient query. 46 - Abdoul Fatakhou Ba, Yingchi Mao, Abdullahi Uwaisu Muhammad, Omaji Samuel, Tasiu Muazu, Umar Muhammad Mustapha Kumshe:
Blockchain federated learning with sparsity for IoMT devices. 47 - Seyed Alireza Omranian, Maziar Goudarzi:
Greedy algorithm for dynamic allocation of intelligent services in vehicular edge computing. 48 - WeiGuang Gu, Fang Wang:
A multi-strategy improved dung beetle optimisation algorithm and its application. 49 - Radjaa Bensaid, Nabila Labraoui, Hafida Saidi, Haythem Bany Salameh:
Securing fog-assisted IoT smart homes: a federated learning-based intrusion detection approach. 50 - Meysam Jahani, Fatemeh Raji, Zahra Zojaji:
Securing supply chain through blockchain-integrated algorithmic system: ensuring product quality and counterfeiting tags detection. 51 - Linqiu Gui, Chunnian Zeng, Jie Luo, Xiaofeng Wang, Xu Yang, Shengshi Zhong:
Graph-based robust 3D point cloud map merging approach for large scale. 52 - Bingxian Li, Lin Zhu, Long Tan:
A vehicular edge computing content caching solution based on content prediction and D4PG. 53 - Alireza Alibakhshi, Erfan Hassannayebi:
Towards an enhanced next activity prediction using attention based neural networks. 54 - Lei Zhou, Yanyan Dong, Bingya Ma, Zhewen Yin, Fan Lu:
Object detection in low-light conditions based on DBS-YOLOv8. 55 - Sunita Rani, Geeta Kasana, Shalini Batra:
An efficient content based image retrieval framework using separable CNNs. 56 - Adnane Talha, Anas Bouayad:
Quasi-opposition Remora Optimizer based Nelder-Mead algorithm for tasks scheduling in cloud. 57 - Hayette Zeghida, Mehdi Boulaiche, Ramdane Chikh, Alwi M. Bamhdi, Ana Luiza Bessa Barros, Djamel Zeghida, Ahmed Patel:
Enhancing IoT cyber attacks intrusion detection through GAN-based data augmentation and hybrid deep learning models for MQTT network protocol cyber attacks. 58 - Zihan Wang, Jiqun Zhang, Yongwei Tang, Hongyuan Cheng:
BGAS: blockchain-based secure and efficient group key agreement scheme for dynamic vehicular platoon. 59 - Mohd Sakib, Shahnawaz Ahmad, Khalid Anwar, Mohd Saqib:
Optimizing support vector regression using grey wolf optimizer for enhancing energy efficiency and building prototype architecture. 60 - Mohammed Batis, Yi Chen, Mingjing Wang, Lei Liu, Ali Asghar Heidari, Huiling Chen:
ACGRIME: adaptive chaotic Gaussian RIME optimizer for global optimization and feature selection. 61 - Shuling Hou, Gaoshang Xiao, Huiying Zhou:
High-performance network attack detection in unknown scenarios based on improved vertical model. 62 - Hamza Hammami, Sadok Ben Yahia, Mohammad S. Obaidat:
A Robust Mutual Authentication Scheme for Health-Focused Connected Intelligent Objects. 63 - Xun Weng, Wenke She, Hongqiang Fan, Jingtian Zhang, Lifen Yun:
Multi-depot vehicle routing problem with drones in emergency logistics. 64 - Yufeng Wang, Yong Zhang, Zhuo Shuang, Ke Chen, Chunyu Xu:
A novel hybrid differential particle swarm optimization based on particle influence. 65 - Junliang Wang, Baohong Lin, Jiao Zhang, Mengyu Sun, Yongchen Pan:
An optimized RDMA QP communication mechanism for hyperscale AI infrastructure. 66 - Prashanth Choppara, Sudheer Mangalampalli:
An efficient deep reinforcement learning based task scheduler in cloud-fog environment. 67 - Shi-Hui Zhang, Jie-Sheng Wang, Si-Wen Zhang, Yu-Xuan Xing, Xiao-Fei Sui:
Multi-strategy fusion snake optimizer on task offloading and scheduling for IoT-based fog computing multi-tasks learning. 69 - Chaimae Hazman, Azidine Guezzaz, Said Benkirane, Mourade Azrour:
A smart model integrating LSTM and XGBoost for improving IoT-enabled smart cities security. 70 - Shengsheng Lin, Weiwei Lin, Feiyu Zhao, Haojun Chen:
Benchmarking and revisiting time series forecasting methods in cloud workload prediction. 71 - Emrah Aslan, Yildirim Özüpak:
Detection of road extraction from satellite images with deep learning method. 72 - Mohd Sakib
, Suhel Mustajab
, Mahfooz Alam
:
Ensemble deep learning techniques for time series analysis: a comprehensive review, applications, open issues, challenges, and future directions. 73 - Dongxian Yu, Weiyong Zheng:
A hybrid evolutionary algorithm to improve task scheduling and load balancing in fog computing. 74
Volume 28, Number 2, April 2025
- Keyu Zhong, Fen Xiao, Xieping Gao:
Three-dimensional dynamic collaborative path planning for multiple UCAVs using an improved NSGAII. 75 - Fengxian Wang, Dailin Li, Jie Zhang, Xiabing Wang, Linwei Li, Xiaoping Shi:
Multiple adaptive fusion network with Mittag Leffler IoU loss for aircraft detection in remote sensing images. 76 - Malha Merah, Zibouda Aliouat, Hakim Mabed:
Dynamic load balancing of traffic in the IoT edge computing environment using a clustering approach based on deep learning and genetic algorithms. 77 - Ying Qiao, Junhan Xiong, Yiguo Zhao:
Network-aware container scheduling in edge computing. 78 - Torana Kamble, Madhuri Ghuge, Ritu Jain, Vaishali Sarbhukan Bodade:
Secure data transmission in cloud computing using a cyber-security trust model with multi-risk protection scheme in smart IOT application. 79 - Benyamin Abdollahzadeh, Hatef Javadi, Oguz Toragay, Nicola Epicoco, Nima Khodadadi:
The green marine waste collector routing optimization with puma selectison-based neighborhood search algorithm. 80 - Yuansheng Gao, Jinpeng Wang, Changlin Li:
Escape after love: Philoponella prominens optimizer and its application to 3D path planning. 81 - Weiye Wang, Qing Li, Honglei Mu:
Exploring malware complexities: a behavior and characteristic analysis approach for robust and accurate cybersecurity. 82 - Roya Zareh Farkhady, Kambiz Majidzadeh, Mohammad Masdari, Ali Ghaffari:
3DLBS-BCHO: a three-dimensional deep learning approach based on branch splitter and binary chimp optimization for intrusion detection in IoT. 83 - Lingru Cai, Yuelong Liu, Jianlong Xu, Mengqing Jin:
Lcsa-fed: a low cost semi-asynchronous federated learning based on lag tolerance for services QoS prediction. 84 - Nilakshee Rajule, Mithra Venkatesan, Radhika Menon, Anju Kulkarni:
Adaptive reinforcement learning based joint approach for energy efficiency in ultra dense networks: ARJUN model. 85 - Essam H. Houssein, Someya Mohsen Zaki, Marwa M. Emam, Nagwan M. Abdel Samee, Reem Ibrahim Alkanhel, Eman M. G. Younis:
Leveraging explainable artificial intelligence for emotional label prediction through health sensor monitoring. 86 - Niayesh Gharaei, Aliaa M. Alabdali:
Optimizing smart health monitoring systems: enahancing energy efficiency and reducing latency with multi-level clustering and grey wolf optimizer. 87 - Shawal Khan, Shahzad Khan:
Latency aware graph-based microservice placement in the edge-cloud continuum. 88 - Sanaz Feizi, Hamidreza Ghaffari:
Botnet detection and information leakage mitigation with differential privacy under generative adversarial networks. 89 - Priyadarshni, Praveen Kumar, Nilesh Arjun Gupta, Rajiv Misra:
Integrating of IOTA-based blockchain with edge computing for task offloading powering the metaverse. 90 - Ajit Kumar Mahapatra, Nibedan Panda, Madhumita Mahapatra, Tarakanta Jena, Arup Kumar Mohanty:
A fast-flying particle swarm optimization for resolving constrained optimization and feature selection problems. 91 - Aymen Takie Eddine Selmi, Mohamed Faouzi Zerarka, Abdelhakim Cheriet:
Efficient technique utilizing an embedding hierarchical clustering-based representation into crossed cubes for TSP optimization. 92 - Khwaja Mansoor, Mehreen Afzal, Waseem Iqbal, Yawar Abbas:
Securing the future: exploring post-quantum cryptography for authentication and user privacy in IoT devices. 93 - Juan Chen, Jia Zhao, Renbin Xiao, Zhihua Cui, Hui Wang, Jeng-Shyang Pan:
Role division approach for firefly algorithm based on t-distribution perturbation and differential mutation. 94 - Arun Mani Tripathi, Lokendra Singh Umrao:
Integrated fuzzy decision tree based blockchain federated safety-as-a-service for IIoT. 95 - Zhongmin Wang, Shuai Zhang, Xiaomin Jin, Yanping Chen, Chen Lu:
Joint resource allocation and privacy protection for MEC task offloading in industrial Internet. 96 - Sarika Mustyala, Manjubala Bisi:
Ensembling Harmony Search Algorithm with case-based reasoning for software development effort estimation. 97 - Hao Guo, Bin Deng, Weidong Li:
Multi-resource maximin share fair allocation in the cloud-edge collaborative computing system with bandwidth demand compression. 98 - Xiaoxu Wei, Chen Niu, Lianzheng Zhao, Yongsheng Wang:
Combination of ant colony and student psychology based optimization for the multi-depot electric vehicle routing problem with time windows. 99 - Shuangquan Xu, Xiji Li, Qing Liu, Haiyang Dong, Xiaoyan Xu, Licai Yan, Yue Zhang:
Intelligent monitoring system for environmental protection during the construction period of pumped storage power station. 100 - Yuping Wang, Peng Zhang, Bo Wang, Zhifeng Zhang, Yaoli Xu, Bin Lv:
A hybrid PSO and GA algorithm with rescheduling for task offloading in device-edge-cloud collaborative computing. 101 - Ashutosh Kumar Singh, Satender Kumar, Sarika Jain:
A multi-agent deep reinforcement learning approach for optimal resource management in serverless computing. 102 - Ashfaq Ahmad Najar, S. Manohar Naik:
AE-CIAM: a hybrid AI-enabled framework for low-rate DDoS attack detection in cloud computing. 103 - Mina Mohammadi, Fatemeh BahraniPour, Sepehr Ebrahimi Mood, Mohammad Farshi:
Security-aware resource allocation in fog computing using a meta-heuristic algorithm. 104 - Mohamed Farhat, Salah Kamel, Almoataz Y. Abdelaziz:
Modified Tasmanian devil optimization for solving single and multi-objective optimal power flow in conventional and advanced power systems. 105 - Suqian Wu, Jie Liu, Bitao He, Chuan Lin, Jing Yang, Wei Wei:
An enhanced DV-hop localization algorithm based on hop distance correction and multi-strategy modified Aquila Optimizer in HWSNs. 106 - Changjong Kim, Yongseok Son, Sunggon Kim:
Investigating the effects of SQL hints on diverse storage devices through empirical analysis. 107 - Hibat Eallah Mohtadi, Abdellah Ouammou, Mohamed Hanini, Abdelkrim Haqiq:
Resilient vehicular fog computing networks: an analytical approach to system reliability under breakdown and vacation interruptions. 108 - Gurjot Kaur, Deepti Kakkar:
A secure lightweight authentication model with interference aware routing and attack detection approach in VANET. 109 - Yue Wang, Xiaohu Zhao:
IG-PGFT: A secure and efficient intelligent grouping PBFT consensus algorithm for the Industrial Internet of Things. 110 - Soyeon Park, Hyokyung Bahn:
Combining genetic algorithms and bayesian neural networks for resource usage prediction in multi-tenant container environments. 111 - Nasir Ahmad Jalali, Hongsong Chen:
Federated learning incentivize with privacy-preserving for IoT in edge computing in the context of B5G. 112 - Mamoru Mimura
, Kazuyuki Kurashina:
Practical evasion attack against neural network-based macro-malware detection method. 113 - Christos Chrysanthos Nikolaidis, Pavlos S. Efraimidis:
Advancing elderly social care dropout prediction with federated learning: client selection and imbalanced data management. 114 - Qinghua Ling, Wenkai Liu, Fei Han, Jinlong Shi, Ali Aweis Hussein, Ben Sanvee Sayway:
Feature selection using importance-based two-stage multi-modal multiobjective particle swarm optimization. 115 - Zhendong Wang, Biao Xie, Shuxin Yang, Dahai Li, Junling Wang, Sammy Chan:
A deep residual SConv1D-attention intrusion detection model for industrial Internet of Things. 116 - Shweta Kushwaha, Ravi Shankar Singh:
Deadline and budget-constrained archimedes optimization algorithm for workflow scheduling in cloud. 117 - Shudong Wang, Yanxiang Zhang, Xiao He, Nuanlai Wang, Zhi Lu, Baoyun Chen, Shanchen Pang:
Microservice deployment in cloud-edge environment using enhanced global search grey wolf optimizer-greedy algorithm. 118 - Pan Xu, Hui Gao, Yixuan Wang:
Sparse dual-weighting ensemble clustering. 119 - Yichun Yu, Xiaoyi Yang, Zheping Chen, Yuqing Lan, Zhihuan Xing, Dan Yu:
Fedgac: optimizing generalization in personalized federated learning via adaptive initialization and strategic client selection. 120 - Junbi Xiao, Jinhai Fan, Hao Lu:
Sppdp-fl: adaptive client selection and dimensional projection for performance enhancement in personalized differential privacy federated learning. 121 - Xiangxu Meng, Wei Li, Zhihan Liu, Junze Yang, Wenqi Zheng:
HG-Net: a novel neural network with hierarchical grouped convolution for indoor fingerprint positioning. 122 - Hanqiao Huang, Bo Du, Huan Zhou, Meng Wang, Yufei Ming, Gang Hu:
A path planning method in three-dimensional complex space based on Bézier curves and a hybrid zebra optimization algorithm. 123 - Jiawen Huang, Liyan Xiong, Xiaohui Huang, Qingsen Chen, Peng Huang:
Filter pruning via annealing decaying for deep convolutional neural networks acceleration. 124 - Junbi Xiao, Yunhuan Cong, Wenjing Zhang, Wenchao Weng:
A cellular traffic prediction method based on diffusion convolutional GRU and multi-head attention mechanism. 125 - Muhammad Asad, Safa Otoum:
Bppfl: a blockchain-based framework for privacy-preserving federated learning. 126 - Retraction Note: Real-time network virtualization based on SDN and Docker container. 127
- Oluwatayomi Rereloluwa Adegboye, Afi Kekeli Feda:
Improved exponential distribution optimizer: enhancing global numerical optimization problem solving and optimizing machine learning paramseters. 128 - Yuchen Wang, Zhongcheng Wei, Zishan Huang, Jian Yang, Jijun Zhao:
Dependent task offloading for air-ground integrated MEC networks: a multi-agent collaboration approach. 129 - Shobhana Kashyap, Avtar Singh, Sukhpal Singh Gill:
Machine learning-centric prediction and decision based resource management in cloud computing environments. 130 - Arabinda Pradhan, Amardeep Das, Sukant Kishoro Bisoy:
Modified parallel PSO algorithm in cloud computing for performance improvement. 131 - Henry Ohiani Ohize, Adeiza James Onumanyi, Buhari Ugbede Umar, Lukman Adewale Ajao, Rabiu O. Isah, Eustace Manayi Dogo, Bello Kontagora Nuhu, Olayemi M. Olaniyi, James Garba Ambafi, Vincent B. Sheidu, Muhammad M. Ibrahim:
Blockchain for securing electronic voting systems: a survey of architectures, trends, solutions, and challenges. 132 - Yuefeng Xu, Rui Zhong, Yang Cao, Chao Zhang, Jun Yu:
Symbiotic mechanism-based honey badger algorithm for continuous optimization. 133 - Lingxi Hu, Yuanyuan Hu, Linhua Jiang, Wei Long:
Federated learning client selection algorithm based on gradient similarity. 134 - Jahez Abraham Johny, K. A. Asmitha, P. Vinod, G. Radhamani, Rafidha Rehiman K. A., Mauro Conti:
Deep learning fusion for effective malware detection: leveraging visual features. 135 - Afnan Al-Ali, Raseena M. Haris, Younes Akbari, Moutaz Saleh, Somaya Al-Máadeed, Rajesh Kumar Muthu:
Integrating binary classification and clustering for multi-class dysarthria severity level classification: a two-stage approach. 136 - Ali Boroumand, Mirsaeid Hosseini Shirvani, Homayun Motameni:
A heuristic task scheduling algorithm in cloud computing environment: an overall cost minimization approach. 137 - Shiva Sattarpour, Ali Barati, Hamid Barati:
EBIDS: efficient BERT-based intrusion detection system in the network and application layers of IoT. 138 - Ravindrakumar Purohit, Jai Prakash Verma, Rachna Jain, Ashish Kumar:
FedBlocks: federated learning and blockchainbased privacy-preserved pioneering framework for IoT healthcare using IPFS in web 3.0 era. 139 - Sanket Mishra, Thangellamudi Anithakumari, Rashmi Sahay, Rajesh Kumar Shrivastava, Sachi Nandan Mohanty, Afzal Hussain Shahid:
LIRAD: lightweight tree-based approaches on resource constrained IoT devices for attack detection. 140 - Liping Zhou, Xu Liu, Ruiqing Tian, Wuqi Wang, Guowei Jin:
A multi-strategy enhanced reptile search algorithm for global optimization and engineering optimization design problems. 141 - Pallav Gupta, Swarab Raul, S. Shoba, Karthika Veeramani:
Empowering healthcare with BIEH - blockchain inter-operable electronic health record scheme. 142 - Aram Satouf, Ali Hamidoglu, Ömer Melih Gül, Alar Kuusik, Lütfiye Durak Ata, Seifedine Kadry:
Metaheuristic-based task scheduling for latency-sensitive IoT applications in edge computing. 143 - Ahmed Saidi, Abdelouahab Amira, Omar Nouali:
Securing decentralized federated learning: cryptographic mechanisms for privacy and trust. 144 - Zhiyu Feng, Donglin Zhu, Huaiyu Guo, Jiankai Xue, Changjun Zhou:
A Jaya algorithm based on self-adaptive method for parameters identification of photovoltaic cell and module. 145 - Yashar Ghaemi, Hosam El-Ocla:
Time delay-based routing protocol using genetic algorithm in vehicular Ad Hoc networks. 146 - (Withdrawn) Internet of things and distributed security framework for 5G networks. 147
Volume 28, Number 3, June 2025
- Elham Asadi, Soodeh Hosseini:
Worm propagation modeling considering green worm defense mechanism in complex networks. 148 - Mohamed Wajdi Ouertani, Ghaith Manita, Amit Chhabra, Ouajdi Korbaa:
Chaotic quasi-opposition marine predator algorithm for automatic data clustering. 149 - Junbi Xiao, Wenjing Zhang, Wenchao Weng, Yuhao Zhou, Yunhuan Cong:
Multi-scale fusion dynamic graph convolutional recurrent network for traffic forecasting. 150 - Haoyu Liu, Le Tian, Maozu Guo:
ESDN: edge computing task scheduling strategy based on dilated convolutional neural network and quasi-newton algorithm. 151 - Maryam Shahzeidi, Mohammad Reza Mollahoseini Ardakani, Taghi Javdani Gandomani, Kamal Mirzaie, M. M. Ardakani:
A hybrid model of long short-term memory neural networks and quantum behavior PSO for detecting self-admitted technical debt. 152 - Guilherme Diel, Ana Eloina Nascimento Kraus, Guilherme Piêgas Koslovski:
Knowledge-based job scheduling for HPC. 153 - Farah Fargo, Mitchell Diamond, Olivier Franza, Paul Foose, Jack Adiletta, Matthew Joseph Adiletta, Simon C. Steely Jr.:
Intelligent cache prefetchers in HPC architecture. 154 - Banavath Balaji Naik, Bollu Priyanka, Sarfaraj Alam Ansari:
Energy-efficient task offloading and efficient resource allocation for edge computing: a quantum inspired particle swarm optimization approach. 155 - De-gan Zhang, Shuai Li, Jie Zhang, Ting Zhang:
Novel offloading approach of computing task for internet of vehicles based on particle swarm optimization strategy. 156 - Niraj Prasad Bhatta, Fathi Amsaad:
Ml assisted techniques in power side channel analysis for trojan classification. 157 - Weida Xu, Yang Xu, Sicong Zhang:
Sample-independent federated learning backdoor attack in speaker recognition. 158 - Said Al Afghani Edsa
, Khamron Sunat
:
Enhancing chernobyl disaster optimization: a novel hybridization approach with modified grey wolf optimizer for solving complex optimization problems. 159 - Mohammed A. Khasawneh, Mustafa Daraghmeh, Anjali Awasthi, Anjali Agarwal:
Multilevel learning for enhanced traffic congestion prediction using anomaly detection and ensemble learning. 160 - Sidharth Samal, Rajashree Dash:
Developing a two stage optimized random vector functional link neural network based predictor model utilizing a swift crow search algorithm. 161 - Robertas Damasevicius, Nebojsa Bacanin, Anand Nayyar:
Blockchain technology for a trustworthy social credit system: implementation and enforcement perspectives. 162 - Amir Seyyedabbasi, Gang Hu, Hisham A. Shehadeh, Xiaopeng Wang, Peren Jerfi Canatalay:
V-shaped and S-shaped binary artificial protozoa optimizer (APO) algorithm for wrapper feature selection on biological data. 163 - Haithem Mezni, Hiba Yahyaoui, Hela Elmannai, Reem Ibrahim Alkanhel:
Personalized service recommendation in smart mobility networks. 164 - Wei Liu, Yingmeng Wang, Kaige Li, Zhao Tian, Wei She:
Ftmoe: a federated transfer model based on mixture-of-experts for heterogeneous image classification. 165 - Hong Chen, Jianxun Liu:
Burst load scheduling latency optimization through collaborative content caching in edge-cloud computing. 166 - Rong Zheng, Genliang Li, Ruikang Li, Yan Che, Hui Wen, Song Lu:
A new approach for fire and non-fire aerosols discrimination based on multilayer perceptron trained by modified bonobo optimizer. 167 - Javad Zarean, AmirReza Tajally, Reza Tavakkoli-Moghaddam, Reza Kia:
Robust electroencephalogram-based biometric identification against GAN-generated artificial signals using a novel end-to-end attention-based CNN-LSTM neural network. 168 - Sad-Houari Nawal, Taghezout Noria, Hadj-Sahraoui Nihad:
Expertise as a signature: continuous implicit authentication based on behavior. 169 - Senda Bouaziz, Soumaya Boukettaya, Ahlem Nabli, Faïez Gargouri:
A formal algebra for document-oriented NoSQL data warehouses: formalisation and evaluation. 170 - Armin Choupani, Sadoon Azizi, Mohammad Sadegh Aslanpour:
Joint resource autoscaling and request scheduling for serverless edge computing. 171 - Hongming Chen, Qingli Yu, Guocai Yang, Hui Zhang, Gang Li, Qian Chen, Yonghua Li:
Compound strategy based binary willow catkin optimization for feature selection. 172 - Macilia Boukhama, Zoubeyr Farah, Lynda Alkama:
A QoS-aware IoT services composition approach based on the modified violation constraints handling technique and enhanced fireworks algorithm. 173 - Abdulvahap Kahveci
, Veysel Alcan
, Murat Uçar, Alper Gümüstepe, Esra Bilgin, Ismihan Sunar
, Sebnem Ataman
:
Classification of radiographic and non-radiographic axial spondylarthritis in pelvic radiography using deep convolution neural network models. 174 - Kenan Senturk, Ahmet Faruk Gormus, Serkan Gönen, Mehmet Ali Bariskan, Ahmet Kaan Durmaz:
Artificial intelligence-enhanced intrusion detection systems for drone security: a real-time evaluation of algorithmic efficacy in mitigating wireless vulnerabilities. 175 - Lucileide M. D. Da Silva, Pedro V. A. Alves, Sérgio N. Silva, Marcelo A. C. Fernandes:
Adaptive horizontal scaling in kubernetes clusters with ANN-based load forecasting. 176 - Tianbao Liu, Yue Li, Xiwen Qin:
Hybrid strategy improved Harris Hawks optimization algorithm for global optimization and microgrid economic scheduling problem. 177 - Daoliang He, Pingpeng Yuan:
TDS: fast answering reachability queries with hierarchical traversal trees. 178 - Wangbo Shen, Weiwei Lin, Wentai Wu, Haijie Wu, Keqin Li:
Reinforcement learning-based task scheduling for heterogeneous computing in end-edge-cloud environment. 179 - Muhammad Muneem Shabir, Kaiwen Zhang, Bertrand Reulet, Ghyslain Gagnon:
Qaas: hybrid cryptocurrency wallet-as-a-service based on Quantum RNG. 180 - Faisal Rasheed Lone, Harsh Kumar Verma:
MP-TMD: A Multidimensional Plausibility-driven Cooperative Trust Model for Multiple Misbehaviour Detection in Intelligent Transportation Systems. 181 - Lianfu Zhang, Guangwei Fang, Zuowen Tan:
FedCCW: a privacy-preserving Byzantine-robust federated learning with local differential privacy for healthcare. 182 - Huanhuan Zou, Kai Wang:
Improved multi-strategy beluga whale optimization algorithm: a case study for multiple engineering optimization problems. 183 - Ahmed A. Ismail, Nour El-Deen Khalifa, Reda A. El-Khoribi:
A survey on resource scheduling approaches in multi-access edge computing environment: a deep reinforcement learning study. 184 - Ningtao Peng, Yu Zheng, Zhikai Xiao, Guiliang Gong, Dan Huang, Xiahui Liu, Kaikai Zhu, Qiang Luo:
Multi-objective dynamic distributed flexible job shop scheduling problem considering uncertain processing time. 185 - Meilin Zhang, Huiling Chen, Ali Asghar Heidari, Yi Chen, Zongda Wu, Zhennao Cai, Lei Liu:
WHHO: enhanced Harris hawks optimizer for feature selection in high-dimensional data. 186 - Wassim Abbessi, Sofiane Ouni, Rabeb Ben Othmen, Wafa Badreddine, Gilles Dequen:
Random cluster parallel PBFT global consensus for consistent blockchain distributed ledger. 187 - Saleem Malik, S. Gopal Krishna Patro, Chandrakanta Mahanty, Ayodele Lasisi, Osamah J. Al-sareji:
MutaSwarmClus: enhancing data clustering efficiency with mutation-enhanced swarm algorithm. 188 - Vinita Bhandiwad, Lakshmappa K. Ragha:
Enhancing the security of IOT enabled systems using light weight hybrid cryptography models. 189 - Shuwei Zhu, Wenping Wang, Wei Fang, Meiji Cui:
Critical vector based evolutionary algorithm for large-scale multi-objective optimization. 190 - Ahmed M. Tawfik, Ayman Al-Ahwal, Adly S. Tag Eldien, Hala H. Zayed:
PriCollabAnalysis: privacy-preserving healthcare collaborative analysis on blockchain using homomorphic encryption and secure multiparty computation. 191 - Ravikumar Sethuraman, Kiruthika Venkataramani, Malu Manickam Yamuna Devi, Surendran Subbaraj:
Enhancing autonomous vehicle performance with ensemble weighted support vector-based optimization in cloud. 192 - Fei Peng, Rui Zhong, Chao Zhang, Jun Yu:
Group-driven Remora Optimization Algorithm with multiple search and regeneration strategies. 193 - Mohd Anas Wajid, Mohammad Saif Wajid, Aasim Zafar, Hugo Terashima-Marín:
Digital Twin technology for multimodal-based smart mobility using hybrid Co-ABC optimization based deep CNN. 194 - Ran Zhang, Xiao Chen, Maoyuan Li:
Multi-UAV cooperative task assignment based on multi-strategy improved DBO. 195 - Demetrio Deanda, Izzat Alsmadi, Jesus Guerrero, Gongbo Liang:
Defending mutation-based adversarial text perturbation: a black-box approach. 196 - Yinghui Meng, Nuo Zhu, Duan Li, Jiaofen Nan, Yongquan Xia, Ni Yao, Chuang Han:
Stepwise discriminant analysis based optimal frequency band selection and ensemble learning for same limb MI recognition. 197 - Ashwini Pithani, Rashmi Ranjan Rout:
CFL-ATELM: an approach to detect botnet traffic by analyzing non-IID and imbalanced data in IoT-edge based 6G networks. 198 - Mohammad Faraji Mehmandar, Mostafa Ghobaei-Arani
, Ali Shakarami:
A cost-aware IoT application deployment approach in fog computing. 199 - Rui Zhong, Shilong Zhang, Yujun Zhang, Jun Yu:
A novel adjacent matrix-based probabilistic selection mechanism for differential evolution. 200 - Abdellah Amzil, Mohamed Hanini, Abdellah Zaaloul:
Modeling and analysis of LoRa-enabled task offloading in edge computing for enhanced battery life in wearable devices. 201 - Zhaojun Zhang, Simeng Tan, Jiale Qin, Kuansheng Zou, Shengwu Zhou:
Multi-strategy ant colony optimization with k-means clustering algorithm for capacitated vehicle routing problem. 202 - Abdelkarim Ait Temghart, Mbarek Marwan, Mohamed Baslam:
Optimization of computational offloading in the mobile edge: a game theoretic approach. 203 - Robert Antwi, James Dzisi Gadze, Eric Tutu Tchao, Axel Sikora, Kwame Opuni-Boachie Obour Agyekum, Henry Nunoo-Mensah, Andrew Selasi Agbemenu, Justice Owusu Agyemang, Dominik Welte, Abdul-Rahman Ahmed, Eliel Keelson:
Optimising peer-to-peer topology for blockchain-based industrial internet of things networks using particle swarm optimisation. 204 - Isaac D. Sánchez-García, Tomás San Feliu, José A. Calvo-Manzano:
Building a cyber risk treatment taxonomy. 205 - Abdul Razaque, Gulnara Bektemyssova, Joon Yoo, Salim Hariri, Meer Jaro Khan, Nurgul Nalgozhina, Jaeryong Hwang, M. Ajmal Khan:
Review of malicious code detection in data mining applications: challenges, algorithms, and future direction. 206 - Guikun Wang, Bin Wen, Jingtao He, Qingbin Meng:
A new approach to reduce energy consumption in priority live migration of services based on green cloud computing. 207

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.