Ausgabe 16/2025
Inhalt (73 Artikel)
MBST: a bad smells testbed for microservice systems
Yongchao Xing, Weipan Yang, Jiaxuan Yin, Dianhui Chu, Zhiying Tu
Towards a lightweight hybrid multimodal approach for intrusion detection in edge-enabled IoT devices
Nithya Nedungadi, Sriram Sankaran, Krishnashree Achuthan
FogChainFlow: On-off blockchain data management for optimizing IoT healthcare
P. Karthikeyan, K. Brindha
TBAC-IDS: enhancing intrusion detection with transformer-based alerts correlation
Abdelkader Bouguessa, Sid Ahmed Mokhtar Mostefaoui, Mohamed Amine Daoud, Abdelkader Alem, Said Mekroussi, Moustafa Maasakri, Ahmed Hasan
Orbit-aware task scheduling in satellite edge computing
- Open Access
Danilo Magliarisi, Emiliano Casalicchio, Vincenzo Salvatore
Ensemble multi-label machine learning solidity smart contract vulnerability detection model
- Open Access
Rashed Alnuman, Tayyab Sajid, Wesam Almobaideen, Qusai Hasan
3-Path Vertex Cover Problem based on the Variable Neighborhood Search algorithm and the Artificial Bee Colony algorithm
Jingrong Chen, Yange Li, Xue Li
Provably secure, lightweight, privacy-preserving PUF-based authentication and key agreement scheme using blockchain technology for internet of drones in smart cities
Blaize Tom Parambil, Panchami Vamattathil, Shelcy Paulose, Sharon Justine Payattukalanirappel
A three-tier generative AI workflow for metaverse asset creation
- Open Access
Rio Mukhtarom Paweroi, Mutawally Syarawy, Mario Köppen
Federated learning and deep reinforcement networks for privacy-preserving real-time data analytics in smart healthcare systems
Veeramalai Sankaradass, V. K. Manindra Manish
Enhancing base station anonymity in WSNs: a security framework using ring routing, fake packet injection, and dynamic coverage
Farouq Aliyu, Uthman Baroudi, Mohammed Younis
Unique explainable federated learning approach for detecting model poisoning attacks to secure systems
Muhmmad Fizan, Alaa Awad Abdellatif, Muhammad Asad, Muhammad Zubair, Bin Ni, Bin Xu, Xuefeng Liu, Jichuan Xiong, Muhammad Qasim Mehmood
LLM-Enhanced metaheuristics with single-shot and few-shot learning for multi-robot exploration tasks
- Open Access
Ali El Romeh, Vaclav Snasel, Seyedali Mirjalili
A decentralized blockchain and IPFS-based framework for secure traceability in agricultural waste-to-energy conversion
Lubna Mohamad Vakil, Raja Wasim Ahmad, Mirna Nachouki, Junaid Shuja
An efficient social-driven educational competition optimizer for numerical optimization
Cheng Qian, Xinyu Cai
Multi-threaded SIMD strategies and frequency scaling for sustainable evolutionary biology
- Open Access
Sergio Santander-Jiménez, Miguel A. Vega-Rodríguez
A hybrid approach based on neural network algorithm for task scheduling
F. Abil, N. Daneshpour, Z. Torabi
A blockchain and B-tree indexing approach to improve traceability and query efficiency in food supply chain
Ilyas Ziaya, Brahim Farou, Zineddine Kouahla, Hamid Seridi
Empowering career development: a comprehensive AI-driven system for personalised guidance and recommendations
Clement Babu, Fahimeh Jafari
Blockchain-based framework for secure medical data sharing and disease diagnosis using optimized deep belief networks
Nikhil Sharma, Prashant Giridhar Shambharkar
Workflow ensemble scheduling in edge-based infrastructures for workflows with optional and mandatory tasks using Heuristic algorithms
Farzaneh Rastegar, Zahra Nazari, MohammadAmin Fazli, Jafar Habibi
A secure and reliable distributed storage system with multi-factor trust-aware workflow scheduling
Zeeshan Hameed, Claus Pahl, Mohammad Hajian Berenjestanaki, Ibe Van Thillo
A modified wind driven optimization algorithm and its applications in hardware-software partitioning
Le-Le Mao, Azlan Mohd Zain, Kai-Qing Zhou, Xin Li
Behavior-guided noise purification for multimodal graph contrastive learning recommendation model
Zuhua Dai, Yaoguang Yang, Zihan Qin, Kun Deng
A privacy-centric federated learning framework with blockchain and dynamic client selection mechanisms
Ahmed Saidi, Abdelouahab Amira, Omar Nouali
AHIBCS: an adaptive historical-information-based client selection algorithm for Non-IID data
Wei Liu, Xu Wang, Bin Wang, Wentao Cui, Zhao Tian, Guangjun Zai
A new efficient model to enhance the success of cloud-based service composition systems using an enhanced learning-based algorithm
Xijing Zhang, ZhongJie Shen, Rui Xie
Real-time detection method of typical defects in transmission line under complex lighting and backgrounds
Guoguang Tan, Liu Liu, Ziteng Liu, Bin Wen, Lili Li, Yongsheng Ye
Efficient hybrid feature selection using intrinsic and metaheuristic optimization algorithm and classification of malware using ensemble learning algorithm
S. B. Chandini, A. B. Rajendra, Vinayakumar Ravi, Suliman A. Alsuhibany, C. M. Naveen Kumar
Musk ox optimizer (MO): a novel optimization algorithm and its application
Yongliang Yuan, Guangya Chong, Jianji Ren, Wu Zhao, Yanan Li, Zhenxi Wang, Seyedali Mirjalili
An SGX-based key protection scheme for Hyperledger Fabric
Zhengwei Ren, He Li, Guangxin He, Rongwei Yu, Yan Tong, Shiwei Xu, Li Deng
Resilient automatic model selection for mobility prediction
- Open Access
Syafiq Al Atiiq, Christian Gehrmann, Karim Khalil, Jakob Sternby, Yachao Yuan
FCDC: Firefly optimization algorithm based compression of deep CNN model with explainability
Lopamudra Mohanty, Mohit Agarwal, Vivek Mehta
Task offloading optimization in IRS-assisted multi-tier computing networks
Zhe Wang, Lijuan Zhou, Jiekai He, Lina Ge
Improved deep Q-network-based UAV path planning in partially observable environments
Raja Jarray, Soufiene Bouallègue
Popularity-based data placement in erasure-coded Edge Storage Systems
- Open Access
Cosimo Anglano, Massimo Canonico, Rossano Gaeta, Marco Guazzone
EdenDID: an edge computing and blockchain-based decentralized identity system for Web3 applications and DePIN
- Open Access
Hongbo Liu, Jiannong Cao, Yinfeng Cao, Dongbin Bai, Jinwen Liang, Ruidong Li
Optimizing malware detection across platforms using the firefly algorithm in cyber threat intelligence
Hadeel Alazzam, Orieb Abualghanam, Moutaz Alazab
Lightweight and hybrid image encryption approach: dynamic anchor blocks selection
Mohammad Alnabhan, Saleem Alsaraireh, Yousef AbuHour, Hatem Mosa, Laith Alshaggah
Study on reliable federated learning model in IoV environments
Xu Wu, Jie Tian, Yuanpeng Li, Guoqiang Zhang, Bin Wen
Research on optimization of brain-controlled typing recognition based on imaginary handwriting
Jiaofen Nan, Panpan Xu, Kaifan Zhang, Qian Xu, Siyuan Zhang, Yongquan Xia, Chuang Han, Duan Li, Yinghui Meng
Convolutional neural network with cascade fusion and spatial local feature enhancement for infrared maritime target detection
He Xu, Lili Dong, Yulin Gao, Yichen Wang, Zihao Liu
AFS-LVNet: adaptive feature shuffle lightweight V-Net model for pulmonary nodule segmentation
Lihong Zhang, Tong Liu, Junding Sun
Combining client-based anomaly detection and federated learning for energy forecasting in smart buildings
Bouchra Fakher, Mohamed el Amine Brahmia, Ismail Bennis, Abdelhafid Abouaissa
Integrated A* and DWA algorithms for emergency rescue path planning
Xingna Hou, Yulan Zhao, Jinshuo Zhang, Shouhong Chen
OptiXID: An optimized and eXplainable AI framework for intrusion detection in IoT networks
Fawzia Omer Albasheer, Mayank Agarwal
MD-DLATA: optimized template attack method based on multi-domain feature fusion
Zhiying Feng, Lang Li
A write leveling scheme for synchronizing garbage collection in RAID-enabled SSDs
Cheng Zhang, Peixuan Li, Jinkang Lu, Zhu Yuan, Ping Xie
Distributed secured and trustworthy IoT framework based on SDN, AI, and blockchain
Wiem Bekri, Rihab Jmal, Lamia Chaari Fourati
JORAS: joint offloading and resource auto-scaling in edge computing environment
Milad Ghahari-Bidgoli, Mostafa Ghobaei Arani, Ahmad Sharif
Multi-strategy collaborative improved Snake Optimizer for complex optimization problems and 3D UAV path planning
Heng Wang, Kai Yang, Jiadui Chen, Haisong Huang, Jingwei Yang
Integrating MQTT protocol to improve the performance using dynamic lightweight key sharing protocol for secure IoT communications
Sharadadevi Kaganurmath, Nagaraj G. Cholli, M. R. Anala
Correction: Towards an asynchronous commit in micro-batch streaming systems with log-structured merge-tree based key-value store
- Correction
Kyuli Park, Dongjae Lee, Yeonwoo Jeong, Salim Hariri, Sungyong Park
AI-driven service placement in fog and edge computing environments: a systematic review, taxonomy and future directions
Thatikonda Supraja, Priyanka Chawla, Sukhpal Singh Gill
Progressive probabilistic retransmission method for reliable satellite-to-ground file transfer in LEO environment
Chuangyu Yu, Shaoming Pan, Wenping Song
Integrating deep learning and statistical models for traffic prediction and accident prevention in smart cities
Yousef O. Sharrab, Basma M. Irtahi, Mohammad Ali H. Eljinini, Izzat Alsmadi
TRCA with sparrow-optimized adaptive filter banks for SSVEP recognition
Jiaofen Nan, Siyuan Zhang, Panpan Xu, Kaifan Zhang, Duan Li, Fubao Zhu, Yanting Li, Yongquan Xia, Yinghui Meng
AGU-Net: advancing medical image segmentation with attention-guided U-Net architecture
Sara Khader, Rawan Ghnemat
Beyond the hype: exploring the impact, challenges, and potential of large language models in healthcare
Hafiz Farooq Ahmad, Junaid Sajid, Raihan Ur Rasool, Asad Waqar Malik
DUC-Net: A deep unified cross-modal architecture with cascaded feature learning for medical image segmentation
Yumna Memon, Feng Zeng, Faiza Riaz Khawaja
Deep learning techniques used for the detection of fraudulent activities within the ethereum network
Khalid Alkhatib, Fares Al Ayoub, Qais Marji
Digital twins enabled privacy preserving remote vital signs monitoring
Maemoona Kayani, Abdul Ghafoor, M. Mohsin Riaz, Fawad Khan
AdaptFedDS: adaptive federated learning edge devices selection by using a light-dual reinforcement learning approach
Fazeleh Tavassolian, Mahdi Abbasi, Abbas Ramezani, Atefeh Salimi, Amir Taherkordi, M. Reza Khosravi
Blockchain-based fraud detection: A systematic review of Ethereum network applications
Rawan Ghnemat, Hatem Mosa
NIDS-APNHA: a transfer learning based network intrusion detection system with alert prioritization and network harmony analysis
R. C. Jeyavim Sherin, K. Parkavi