Issue 2/2023
Content (49 Articles)
Security enhancement in cellular networks employing D2D friendly jammer for V2V communication
J. Senthil Kumar, Akhil Gupta, Sudeep Tanwar, Neeraj Kumar, Sedat Akleylek
Security in IoT-enabled smart agriculture: architecture, security solutions and challenges
Anusha Vangala, Ashok Kumar Das, Vinay Chamola, Valery Korotaev, Joel J. P. C. Rodrigues
TrIDS: an intelligent behavioural trust based IDS for smart healthcare system
Ashish Singh, Kakali Chatterjee, Suresh Chandra Satapathy
An evaluation of deep learning models for chargeback Fraud detection in online games
Yu-Chih Wei, You-Xin Lai, Mu-En Wu
A blockchain scheme for authentication, data sharing and nonrepudiation to secure internet of wireless sensor things
Asad Ullah Khan, Nadeem Javaid, Muhammad Asghar Khan, Insaf Ullah
An improved hash algorithm for monitoring network traffic in the internet of things
Teng Zhan, Shiping Chen
HeuCrip: a malware detection approach for internet of battlefield things
Imtiaz Ali shah, Abid Mehmood, Abdul Nasir Khan, Mourad Elhadef, Atta ur Rehman Khan
MultiHop optimal time complexity clustering for emerging IoT applications
Yann Brice Chebu Mtopi, Alain Bertrand Bomgni, Hafiz Munsub Ali, David R. Gnimpieba Zanfack, Waleed Ejaz, Clémentin Tayou Djamegni, Etienne Zohim Gnimpieba
MO-FreeVM: multi-objective server release algorithm for cluster resource management
Shiyan Zhang, Yuchao Zhang, Ran Wang, Xiangyang Gong
Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine
Pramod Pavithran, Sheena Mathew, Suyel Namasudra, Ashish Singh
Reinforcement learning for intelligent online computation offloading in wireless powered edge networks
Ehzaz Mustafa, Junaid Shuja, Kashif Bilal, Saad Mustafa, Tahir Maqsood, Faisal Rehman, Atta ur Rehman Khan
An ECC processor for IoT using Edwards curves and DFT modular multiplication
Osama Al-Khaleel, Selcuk Baktir, Alptekin Küpçü
An attentive hierarchy ConvNet for crowd counting in smart city
Wenzhe Zhai, Mingliang Gao, Alireza Souri, Qilei Li, Xiangyu Guo, Jianrun Shang, Guofeng Zou
A two-dimensional OMA-NOMA user-pairing and power-minimization approach for opportunistic B5G-enabled IoT networks
Haythem Bany Salameh, Haitham Al-Obiedollah, Marah Al-Hayek, Sharief Abdel-Razeq, Ahmad Al-ajlouni
Group intrusion detection in the Internet of Things using a hybrid recurrent neural network
Asma Belhadi, Youcef Djenouri, Djamel Djenouri, Gautam Srivastava, Jerry Chun-Wei Lin
Video coding deep learning-based modeling for long life video streaming over next network generation
Mohammad Alsmirat, Yousef Sharrab, Monther Tarawneh, Sana’a Al-shboul, Nabil Sarhan
Deep learning application detecting SARS-CoV-2 key enzymes inhibitors
Leila Benarous, Khedidja Benarous, Ghulam Muhammad, Zulfiqar Ali
A multichannel EfficientNet deep learning-based stacking ensemble approach for lung disease detection using chest X-ray images
Vinayakumar Ravi, Vasundhara Acharya, Mamoun Alazab
Edge computing based secure health monitoring framework for electronic healthcare system
Ashish Singh, Kakali Chatterjee
AI-based Bayesian inference scheme to recognize electroencephalogram signals for smart healthcare
Puah Jia Hong, Muhammad Adeel Asghar, Amin Ullah, Mohammad Shorfuzzaman, Mehedi Masud, Raja Majid Mehmood
Popular deep learning algorithms for disease prediction: a review
Zengchen Yu, Ke Wang, Zhibo Wan, Shuxuan Xie, Zhihan Lv
An AI-empowered affect recognition model for healthcare and emotional well-being using physiological signals
Zijian Zhou, Muhammad Adeel Asghar, Daniyal Nazir, Kamran Siddique, Mohammad Shorfuzzaman, Raja Majid Mehmood
The effect of QoS and QoE requirements for designing task processing controller based on fuzzy logic on IoT environments
Zhengqiang Yang, Yanling Zhang, Junwei Tian
Business intelligence using deep learning techniques for social media contents
Tarek Kanan, Ala Mughaid, Riyad Al-Shalabi, Mahmoud Al-Ayyoub, Mohammed Elbes, Odai Sadaqa
A survey on deep learning-based identification of plant and crop diseases from UAV-based aerial images
Abdelmalek Bouguettaya, Hafed Zarzour, Ahmed Kechida, Amine Mohammed Taberkit
Deep reinforcement learning-based microservice selection in mobile edge computing
Feiyan Guo, Bing Tang, Mingdong Tang, Wei Liang
On detecting distributed denial of service attacks using fuzzy inference system
Mohammad Almseidin, Jamil Al-Sawwa, Mouhammd Alkasassbeh, Mohammed Alweshah
A novel multi agent recommender system for user interests extraction
Ayman M. Mansour, Mohammad A. Obeidat, Bilal Hawashin
Fusion of deep learning based cyberattack detection and classification model for intelligent systems
Omar A. Alzubi, Issa Qiqieh, Jafar A. Alzubi
Lightweight Gramian Angular Field classification for edge internet of energy applications
Abdullah Alsalemi, Abbes Amira, Hossein Malekmohamadi, Kegong Diao
A pre-trained convolutional neural network with optimized capsule networks for chest X-rays COVID-19 diagnosis
Lobna M. AbouEl-Magd, Ashraf Darwish, Vaclav Snasel, Aboul Ella Hassanien
Towards performance evaluation prediction in WSNs using artificial neural network multi-perceptron
Siham Zroug, Ikram Remadna, Laid Kahloul, Sadek Labib Terrissa, Saber Benharzallah
EHHR: an efficient evolutionary hyper-heuristic based recommender framework for short-text classifier selection
Bushra Almas, Hasan Mujtaba, Kifayat Ullah Khan
Mitigating voltage fingerprint spoofing attacks on the controller area network bus
Wassila Lalouani, Yi Dang, Mohamed Younis
TFAD: TCP flooding attack detection in software-defined networking using proxy-based and machine learning-based mechanisms
K. Muthamil Sudar, P. Deepalakshmi, Ashish Singh, Parvathaneni Naga Srinivasu
Using recommender clustering to improve quality of services with sustainable virtual machines in cloud computing
Mehran Aghaei, Parvaneh Asghari, Sepideh Adabi, Hamid Haj Seyyed Javadi
K-anonymity privacy-preserving algorithm for IoT applications in virtualization and edge computing
Chen Ling, Weizhe Zhang, Hui He
Improving virtualization and migration in combinatorial dynamic mapping for cloud services
Ehsan Gorjian Mehlabani, Chongqi Zhang
A near-optimal & load balanced resilient system design for high-performance computing platform
Nilayam Kumar Kamila, Subhendu Kumar Pani, Rashmi Prava Das, P. K. Bharti, Hamid Esmaeili Najafabadi, Mehdi Gheisari, Yang Liu
Towards a secure and dependable IoT data monetization using blockchain and fog computing
Seyednima Khezr, Abdulsalam Yassine, Rachid Benlamri
Resilient and dependability management in distributed environments: a systematic and comprehensive literature review
Zahra Amiri, Arash Heidari, Nima Jafari Navimipour, Mehmet Unal
Abstracting IoT protocols using timed process algebra and SPIN model checker
N. Suresh Kumar, G. Santhosh Kumar
An adaptive and secure routes migration model for the sustainable cloud of things
Naveed Islam, Khalid Haseeb, Amjad Rehman, Teg Alam, Gwanggil Jeon
Multi-factor nature inspired SLA-aware energy efficient resource management for cloud environments
Sonia Bashir, Saad Mustafa, Raja Wasim Ahmad, Junaid Shuja, Tahir Maqsood, Abdullah Alourani
Edge resource slicing approaches for latency optimization in AI-edge orchestration
P. Keerthi Chandrika, M. S. Mekala, Gautam Srivastava
Federated learning for energy constrained devices: a systematic mapping study
Rachid El Mokadem, Yann Ben Maissa, Zineb El Akkaoui