Ausgabe 1/2022
Inhalt (40 Artikel)
Noise-based cyberattacks generating fake P300 waves in brain–computer interfaces
Enrique Tomás Martínez Beltrán, Mario Quiles Pérez, Sergio López Bernal, Alberto Huertas Celdrán, Gregorio Martínez Pérez
A new traffic congestion prediction strategy (TCPS) based on edge computing
Aya M. Kishk, Mahmoud Badawy, Hesham A. Ali, Ahmed I. Saleh
Simulation-based regression analysis for the replenishment strategy of the crane & shuttle-based storage and retrieval system
Wenkai Ma, Jinchang Hu, Yanyan Wang, Yaohua Wu
Software architecture for IoT-based health-care systems with cloud/fog service model
Masoumeh Hajvali, Sahar Adabi, Ali Rezaee, Mehdi Hosseinzadeh
Multi-objective Task Scheduling in cloud-fog computing using goal programming approach
Abbas Najafizadeh, Afshin Salajegheh, Amir Masoud Rahmani, Amir Sahafi
SHARE-ABE: an efficient and secure data sharing framework based on ciphertext-policy attribute-based encryption and Fog computing
Ahmed Saidi, Omar Nouali, Abdelouahab Amira
An analytical framework with border effects to estimate the connectivity performance of finite multihop networks in shadowing environments
Jaiprakash Nagar, Sanjay Kumar Chaturvedi, Sieteng Soh
A two-stage virtual machine abnormal behavior-based anomaly detection mechanism
Hancui Zhang, Weida Zhou
Towards the availability of video communication in artificial intelligence-based computer vision systems utilizing a multi-objective function
Yousef O. Sharrab, Izzat Alsmadi, Nabil J. Sarhan
Task placement for crowd recognition in edge-cloud based urban intelligent video systems
Gaofeng Zhang, Benzhu Xu, Ensheng Liu, Liqiang Xu, Liping Zheng
LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid
Saleh Darzi, Bahareh Akhbari, Hassan Khodaiemehr
Feasibility of P2P-STB based crowdsourcing to speed-up photo classification for natural disasters
Fernando Loor, Manuel Manriquez, Veronica Gil-Costa, Mauricio Marin
A fuzzy approach for optimal placement of IoT applications in fog-cloud computing
Farhad Tavousi, Sadoon Azizi, Abdulbaghi Ghaderzadeh
Best-KFF: a multi-objective preemptive resource allocation policy for cloud computing systems
Ahmed Fathalla, Kenli Li, Ahmad Salah
Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
Yanyan Ji, Bilin Shao, Jinyong Chang, Genqing Bian
A new clustering-based routing method in the mobile internet of things using a krill herd algorithm
Mahyar Sadrishojaei, Nima Jafari Navimipour, Midia Reshadi, Mehdi Hosseinzadeh
Privacy-preserving content-based image retrieval in edge environment
Yuejing Yan, Yanyan Xu, Yiran Zhang, Zhiheng Wang, Zheheng Rao
An in-depth and systematic literature review on the blockchain-based approaches for cloud computing
Jianhu Gong, Nima Jafari Navimipour
Minimizing delay in content-centric networks using heuristics-based in-network caching
Sumit Kumar, Rajeev Tiwari, Sergei Kozlov, Joel J. P. C. Rodrigues
cuGimli: optimized implementation of the Gimli authenticated encryption and hash function on GPU for IoT applications
KyungHyun Han, Wai-Kong Lee, Seong Oun Hwang
Blockchain-assisted authentication and key agreement scheme for fog-based smart grid
Ashish Tomar, Sachin Tripathi
Indoor objects detection system implementation using multi-graphic processing units
Mouna Afif, Riadh Ayachi, Mohamed Atri
Efficient cloud service ranking based on uncertain user requirements
Mohammad Hossein Nejat, Homayun Motameni, Hamed Vahdat-Nejad, Behnam Barzegar
Blockchain-enabled real-time SLA monitoring for cloud-hosted services
Kashif Mehboob Khan, Junaid Arshad, Waheed Iqbal, Sidrah Abdullah, Hassan Zaib
A stacked deep learning approach to cyber-attacks detection in industrial systems: application to power system and gas pipeline systems
Wu Wang, Fouzi Harrou, Benamar Bouyeddou, Sidi-Mohammed Senouci, Ying Sun
Multi-objective workflow scheduling in cloud computing: trade-off between makespan and cost
Ali Belgacem, Kadda Beghdad-Bey
K-Scheduler: dynamic intra-SM multitasking management with execution profiles on GPUs
Sejin Kim, Yoonhee Kim
Cost-aware job scheduling for cloud instances using deep reinforcement learning
Feng Cheng, Yifeng Huang, Bhavana Tanpure, Pawan Sawalani, Long Cheng, Cong Liu
Attack and improvement of the recent identity-based encryption with authorized equivalence test in cluster computing
Seongbong Choi, Hyung Tae Lee
A source-driven reinforcement learning-based Data reply strategy to reduce communication overhead in Named Data Networks (NDN)
Shahid Md. Asif Iqbal, Asaduzzaman, Mohammed Moshiul Hoque
Energy efficiency in cloud computing data center: a survey on hardware technologies
Avita Katal, Susheela Dahiya, Tanupriya Choudhury
Research on sports training model based on intelligent data aggregation processing in internet of things
Juan Dan, Yanjun Zheng, Jianping Hu