Ausgabe 2/2024
Inhalt (65 Artikel)
Human–object interaction recognition based on interactivity detection and multi-feature fusion
Limin Xia, Xiaoyue Ding
Ordered balancing: load balancing for redundant task scheduling in robotic network cloud systems
Saeid Alirezazadeh, Luís A. Alexandre
New Spark solutions for distributed frequent itemset and association rule mining algorithms
Carlos Fernandez-Basso, M. Dolores Ruiz, Maria J. Martin-Bautista
A controller-based roadside unit plane architecture for software-defined internet of vehicles
Ming Mao, Peng Yi, Lilong Hou, Wei Zhao
A distributed B+Tree indexing method for processing range queries over streaming data
Shahab Safaee, Meghdad Mirabi, Amir Masoud Rahmani, Ali Asghar Safaei
Secure transfer of robust healthcare data using blockchain-based privacy
Maddila Suresh Kumar, Vadlamani Nagalakshmi
A machine learning-based optimization approach for pre-copy live virtual machine migration
Raseena M. Haris, Khaled M. Khan, Armstrong Nhlabatsi, Mahmoud Barhamgi
A genetic-based clustering algorithm for efficient resource allocating of IoT applications in layered fog heterogeneous platforms
Kimia Abedpour, Mirsaeid Hosseini Shirvani, Elmira Abedpour
ACPM: adaptive container provisioning model to mitigate serverless cold-start
Anisha Kumari, Bibhudatta Sahoo
Integrated method for distributed processing of large XML data
Rongxin Chen, Guorong Cai, Jie Chen, Yuling Hong
EIoT-DDoS: embedded classification approach for IoT traffic-based DDoS attacks
Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil
Profit-maximization spectrum sharing in opportunistic duopoly market under dynamic spectrum pricing and QoS constraints
Haythem Bany Salameh, Mohammad Qasem Samara, Ghaleb A. Elrefae, Ahmad Al-Ajlouni
An efficient edge caching approach for SDN-based IoT environments utilizing the moth flame clustering algorithm
Seyedeh Shabnam Jazaeri, Sam Jabbehdari, Parvaneh Asghari, Hamid Haj Seyyed Javadi
InPlaceKV: in-place update scheme for SSD-based KV storage systems under update-intensive Worklaods
Jianing Zhao, Yubiao Pan, Huizhen Zhang, Mingwei Lin, Xin Luo, Zeshui Xu
CSADE: a delay-sensitive scheduling method based on task admission and delay evaluation on edge–cloud collaboration
Liyun Zuo, Jieguang He, Yonghui Xu, Lei Zhang
A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture
Shivangi Shukla, Sankita J. Patel
A computationally efficient and randomized RLWE-based key exchange scheme
Komal Pursharthi, Dheerendra Mishra
Self-supervised deep subspace clustering with entropy-norm
Guangyi Zhao, Simin Kou, Xuesong Yin, Guodao Zhang, Yigang Wang
Securing the medical data using enhanced privacy preserving based blockchain technology in Internet of Things
Ramesh Vatambeti, E. S. Phalguna Krishna, M. Ganesh Karthik, Vijay Kumar Damera
Product recommendation using enhanced convolutional neural network for e-commerce platform
Yarasu Madhavi Latha, B. Srinivasa Rao
A deep learning approach for detecting covert timing channel attacks using sequential data
Shorouq Al-Eidi, Omar Darwish, Yuanzhu Chen, Majdi Maabreh, Yahya Tashtoush
An improved arithmetic optimization algorithm for task offloading in mobile edge computing
Hongjian Li, Jiaxin Liu, Lankai Yang, Liangjie Liu, Hu Sun
Framework for wrapping binary swarm optimizers to the hybrid parallel cooperative coevolving version
Mohammadreza Ipchi Sheshgelani, Saeid Pashazadeh, Pedram Salehpoor
A better and fast cloud intrusion detection system using improved squirrel search algorithm and modified deep belief network
Nairita Sarkar, Pankaj Kumar Keserwani, Mahesh Chandra Govil
Intrusion detection in internet of things-based smart farming using hybrid deep learning framework
Keerthi Kethineni, G. Pradeepini
MOM-VMP: multi-objective mayfly optimization algorithm for VM placement supported by principal component analysis (PCA) in cloud data center
Selvam Durairaj, Rajeswari Sridhar
A novel sparrow search algorithm with integrates spawning strategy
Jiaxiang Zhang, Linwei Li, Huanlong Zhang, Fengxian Wang, Yangyang Tian
Task and resource allocation in the internet of things based on an improved version of the moth-flame optimization algorithm
Masoud Nematollahi, Ali Ghaffari, A. Mirzaei
An efficient multi-objective scheduling algorithm based on spider monkey and ant colony optimization in cloud computing
Dina A. Amer, Gamal Attiya, Ibrahim Ziedan
CUDA-aware MPI implementation of Gibbs sampling for an IRT model
William S. Welling, Yanyan Sheng, Michelle M. Zhu
Cloning-based virtual machine pre-provisioning for resource-constrained edge cloud server
Jungwoong Sung, Seung-jae Han, Jin-woo Kim
Network-assisted processing of advanced IoT applications: challenges and proof-of-concept application
Higinio Mora, Francisco A. Pujol, Tamai Ramírez, Antonio Jimeno-Morenilla, Julian Szymanski
Ransomware early detection using deep reinforcement learning on portable executable header
XiZhen Deng, MingCan Cen, M. Jiang, Meiqu Lu
A novel seq2seq-based prediction approach for workflow scheduling
Zhongguo Yang, Mingzhu Zhang, Han Li, Weilong Ding
Spark-based cooperative coevolution for large scale global optimization
Ali Kelkawi, Imtiaz Ahmad, Mohammed El-Abd
Improving the accuracy of diagnosing and predicting coronary heart disease using ensemble method and feature selection techniques
Sohaib Asif, Yi Wenhui, Qurrat ul Ain, Yi Yueyang, Si Jinhai
User request-based scheduling algorithms by managing uncertainty of renewable energy
Slokashree Padhi, R. B. V. Subramanyam
Supporting dynamic update scheme for assured deletion based-multi-copy association tree
Junfeng Tian, Ruxin Bai, Tianfeng Zhang
Improved Harris Hawks optimization for global optimization and engineering design
Lei Chen, Changzhou Feng, Yunpeng Ma
A novel and secure image encryption scheme based on two-dimensional logistic and Arnold Cat map
Muhammad Akraam, Tabasam Rashid, Sohail Zafar
A retrieval method of learners’ behavior features based on K-means clustering algorithm
Shaohua Wang, Xiaoxiong Xu
Parallel mutation testing for large scale systems
Pablo C. Cañizares, Alberto Núñez, Rosa Filgueira, Juan de Lara
Emotion and sentiment analysis for intelligent customer service conversation using a multi-task ensemble framework
Duan Chen, Huang Zhengwei, Tan Yiting, Min Jintao, Ribesh Khanal
A privacy-enhanced human activity recognition using GAN & entropy ranking of microaggregated data
Ahmed Aleroud, Majd Shariah, Rami Malkawi, Samer Y. Khamaiseh, Abdullah Al-Alaj
A JAYA algorithm based on normal clouds for DNA sequence optimization
Donglin Zhu, Siwei Wang, Zuwei Huang, Changjun Zhou, Lin Zhang
Blockchain based reputation management, data storage and distributed revocation in vehicular energy networks in smart health care systems
Abid Jamal, Muhammad Umar Javed, Nabil Alrajeh, Safdar Hussain Bouk, Nadeem Javaid
A collusion-resistant certificateless provable data possession scheme for shared data with user revocation
Guang Yang, Lidong Han, Jingguo Bi, Fuqun Wang
Computational approaches to detect experts in distributed online communities: a case study on Reddit
Sofia Strukova, José A. Ruipérez-Valiente, Félix Gómez Mármol
Secure cloud storage auditing with deduplication and efficient data transfer
Jingze Yu, Wenting Shen
Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques
Ahlem Abid, Farah Jemili, Ouajdi Korbaa
Improving UWB ranging accuracy via multiple network model with second order motion prediction
Guangwei Xing, Yanrong Guo, Xiaoxuan Chen, Hangzai Luo, Sheng Zhong
Cloud benchmarking and performance analysis of an HPC application in Amazon EC2
Tamara Dancheva, Unai Alonso, Michael Barton
An efficient cloud resource exchange model based on the double auction and evolutionary game theory
Mohammad Hossein Ghasemian Koochaksaraei, Abolfazl Toroghi Haghighat, Mohammad Hossein Rezvani
Correction: Scalable NUMA-aware persistent B+-tree for non-volatile memory devices
Safdar Jamil, Abdul Salam, Awais Khan, Bernd Burgstaller, Sung-Soon Park, Youngjae Kim
Retraction Note: Agricultural product monitoring system supported by cloud computing
Chen Jinbo, Cao Xiangliang, Fu Han-Chi, Anthony Lam