Ausgabe 5/2022
Inhalt (40 Artikel)
Achieving data privacy for decision support systems in times of massive data sharing
Rabeeha Fazal, Munam Ali Shah, Hasan Ali Khattak, Hafiz Tayyab Rauf, Fadi Al-Turjman
A high-efficiency learning model for virtual machine placement in mobile edge computing
Chengfeng Jian, Lukun Bao, Meiyu Zhang
Identity-based proof of retrievability meets with identity-based network coding
Yixin Chen, Jinyong Chang
Arrhythmia ventricular fibrillation classification on ECG signal using ensemble feature selection and deep neural network
M. R. Rajeshwari, K. S. Kavitha
Blockchain assisted privacy-preserving public auditable model for cloud environment with efficient user revocation
Rahul Mishra, Dharavath Ramesh, Damodar Reddy Edla, Munesh Chandra Trivedi
Improved security in cloud using sandpiper and extended equilibrium deep transfer learning based intrusion detection
Gavini Sreelatha, A. Vinaya Babu, Divya Midhunchakkaravarthy
Fisher linear discriminant and discrete global swarm based task scheduling in cloud environment
K. M. Ajitha, N. Chenthalir Indra
Efficient and privacy-preserving location-based services over the cloud
Vijay Kumar Yadav, Shekhar Verma, S. Venkatesan
Historical data based approach to mitigate stragglers from the Reduce phase of MapReduce in a heterogeneous Hadoop cluster
Kamalakant Laxman Bawankule, Rupesh Kumar Dewang, Anil Kumar Singh
MCPS: a mapping method for MAERI accelerator base on Cartesian Product based Convolution for DNN layers with sparse input feature map
Babak Narimanjahan, Midia Reshadi, Ahmad Khademzadeh, Akram Reza
An intelligent technique for pattern-based clustering of continuous-valued datasets
Anuradha Dhull, Akansha Singh, Krishna Kant Singh
A two-stage scheduling method for deadline-constrained task in cloud computing
Xiaojian He, Junmin Shen, Fagui Liu, Bin Wang, Guoxiang Zhong, Jun Jiang
A novel generalized fuzzy intelligence-based ant lion optimization for internet of things based disease prediction and diagnosis
Ankit Verma, Gaurav Agarwal, Amit Kumar Gupta
An object detection algorithm based on the feature pyramid network and single shot multibox detector
Yanni Wang, Xiang Liu, Rongchun Guo
Energy efficient load balancing hybrid priority assigned laxity algorithm in fog computing
Simar Preet Singh, Rajesh Kumar, Anju Sharma, Jemal H. Abawajy, Ravneet Kaur
Big data analytics for data-driven industry: a review of data sources, tools, challenges, solutions, and research directions
Anayo Chukwu Ikegwu, Henry Friday Nweke, Chioma Virginia Anikwe, Uzoma Rita Alo, Obikwelu Raphael Okonkwo
Generalized asset fairness mechanism for multi-resource fair allocation mechanism with two different types of resources
Xuejie Zhang, Jie Li, Guibing Li, Weidong Li
BigRC-EML: big-data based ransomware classification using ensemble machine learning
Sana Aurangzeb, Haris Anwar, Muhammad Asif Naeem, Muhammad Aleem
Placement of IoT services in fog environment based on complex network features: a genetic-based approach
Masomeh Azimzadeh, Ali Rezaee, Somayyeh Jafarali Jassbi, Mehdi Esnaashari
A vector convolutional deep autonomous learning classifier for detection of cyber attacks
N. G. Bhuvaneswari Amma
Chromosomes identification based differential evolution (CIDE): a new bio-inspired variant for network intrusion detection
Md. Nayer, Subhash Chandra Pandey
A gradient-based optimization approach for task scheduling problem in cloud computing
Xingwang Huang, Yangbin Lin, Zongliang Zhang, Xiaoxi Guo, Shubin Su
An exploration to graphics processing unit spot price prediction
Muhammad Khan, Ali Imran Jehangiri, Zulfiqar Ahmad, Mohammed Alaa Ala’anzy, Asif Umer
Channel estimation in 5G multi input multi output wireless communication using optimized deep neural framework
Prabhakara Rao Kapula, P. V. Sridevi
Clustering of mobile IoT nodes with support for scheduling of time-sensitive applications in fog and cloud layers
Narges Akhound, Sahar Adabi, Ali Rezaee, Amir Masoud Rahmani
Data replica placement approaches in fog computing: a review
Esmaeil Torabi, Mostafa Ghobaei-Arani, Ali Shahidinejad
An improved multi-objective imperialist competitive algorithm for surgical case scheduling problem with switching and preparation times
Hui Yu, Jun-qing Li, Xiao-long Chen, Wei Niu, Hong-yan Sang
An intelligent system for blood donation process optimization - smart techniques for minimizing blood wastages
Shadi AlZu’bi, Darah Aqel, Mohammad Lafi
Leveraging a cloud-native architecture to enable semantic interconnectedness of data for cyber threat intelligence
Meryem Ammi, Oluwasegun Adedugbe, Fahad M. Alharby, Elhadj Benkhelifa
An enhanced privacy-preserving record linkage approach for multiple databases
Shumin Han, Derong Shen, Tiezheng Nie, Yue Kou, Ge Yu
Intelligent energy aware approaches for residential buildings: state-of-the-art review and future directions
Simarjit Kaur, ·Anju Bala, Anshu Parashar
SMAD: SMart assistant during and after a medical emergency case based on deep learning sentiment analysis
Nourchène Ouerhani, Ahmed Maalel, Henda Ben Ghézala
Novel bat algorithm for QoS-aware services composition in large scale internet of things
Amal Kouicem, Mohamed Essaid Khanouche, Abdelkamel Tari
An enhanced smart card and dynamic ID based remote multi-server user authentication scheme
Nitish Andola, Sourabh Prakash, Raghav Gahlot, S. Venkatesan, Shekhar Verma
The research and analysis of efficiency of hardware usage base on HDFS
Yun Liu, Xiao Zhang, Binbin Liu, Xiaonan Zhao
RSM analysis based cloud access security broker: a systematic literature review
Shahnawaz Ahmad, Shabana Mehfuz, Fateh Mebarek-Oudina, Javed Beg
Correction: Mitigating the worst parent attack in RPL based internet of things
Rashmi Sahay, G. Geethakumari, Barsha Mitra