1 | -- | 26 | Devon Myers, Rami Mohawesh, Venkata Ishwarya Chellaboina, Anantha Lakshmi Sathvik, Praveen Venkatesh, Yi-Hui Ho, Hanna Henshaw, Muna Al-Hawawreh, David Berdik, Yaser Jararweh. Foundation and large language models: fundamentals, challenges, opportunities, and social impacts |
27 | -- | 52 | Kamta Nath Mishra, Vandana Bhattacharjee, Shashwat Saket, Shivam P. Mishra. Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach |
53 | -- | 70 | Sanna Mehraj Kak, Parul Agarwal, M. Afshar Alam, Farheen Siddiqui. A hybridized approach for minimizing energy in cloud computing |
71 | -- | 90 | Abdul Jabbar Saeed Tipu, Padraig Ó Conbhuí, Enda Howley. Artificial neural networks based predictions towards the auto-tuning and optimization of parallel IO bandwidth in HPC system |
91 | -- | 107 | Peng Zhou, Longxin Lin, Zhen Zhang 0017, Yuhui Deng, Tengjiao He. GHB: a cost-effective and energy-efficient data center network structure with greater incremental scalability |
109 | -- | 117 | Puneet Sharma, Manoj Kumar, Ashish Sharma 0003. Machine learning based file type classifier designing in IoT cloud |
119 | -- | 135 | Yuan Zhao 0003, Kang Chen, Zhisheng Ye 0003, Zhiyu Xiang, Qi Lu. Multi-input cloud resource allocation strategy with limited buffer and virtual machine synchronization failure |
137 | -- | 157 | Yunwei Jia, Keke Lu, Xia Li, Chenxiang Hao. SRG: a clustering algorithm based on scale division and region growing |
159 | -- | 175 | Maribell Sacanamboy. Heuristic algorithm for task mapping problem in a hierarchical wireless network-on-chip architecture |
177 | -- | 197 | Chunlin Li 0001, Kun Jiang, Xinyong Li, Libin Zhang, Youlong Luo. Single-tag and multi-tag RFID data cleaning approach in edge computing |
199 | -- | 217 | Maryam Mirzapour-Moshizi, Vahid Sattari Naeini, Amir Sabbagh Molahosseini. Application placement in fog-cum-cloud environment based on a low latency policy-making framework |
219 | -- | 229 | Ankur Jain, Chandrashekar Jatoth, G. R. Gangadharan. Bi-level optimization of resource allocation and appliance scheduling in residential areas using a Fog of Things (FOT) framework |
231 | -- | 267 | Malik Braik. Hybrid enhanced whale optimization algorithm for contrast and detail enhancement of color images |
269 | -- | 284 | Prakhar Sharma, W. Wilfred Godfrey, Aditya Trivedi. When blockchain meets IoT: a comparison of the performance of communication protocols in a decentralized identity solution for IoT using blockchain |
285 | -- | 297 | Lacchita Soni, Harish Chandra, Daya Sagar Gupta, Ram Keval. Quantum-resistant public-key encryption and signature schemes with smaller key sizes |
299 | -- | 311 | Ali Hamdan Alenezi, Mahmoud Nazzal, Ahmed Sawalmeh, Abdallah Khreishah, Sihua Shao, Muhannad Almutiry. Machine learning regression-based RETRO-VLP for real-time and stabilized indoor positioning |
313 | -- | 324 | Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, José Rafael Buendía Rubio, Gérôme Bovet, Gregorio Martínez Pérez. Robust Federated Learning for execution time-based device model identification under label-flipping attack |
325 | -- | 339 | Ahmed Cherif Mazari, Nesrine Boudoukhani, Abdelhamid Djeffal. BERT-based ensemble learning for multi-aspect hate speech detection |
341 | -- | 376 | Mahfooz Alam, Mohammad Shahid, Suhel Mustajab. Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment |
377 | -- | 394 | Chao Jing, Jiaming Li. CBLA_PM: an improved ann-based power consumption prediction algorithm for multi-type jobs on heterogeneous computing server |
395 | -- | 409 | Ramraj Dangi, Praveen Lalwani. Harris Hawks optimization based hybrid deep learning model for efficient network slicing in 5G network |
411 | -- | 441 | Xian Wu, Wenju Zhou, Minrui Fei, Yonglu Du, Huiyu Zhou 0001. Banyan tree growth optimization and application |
443 | -- | 455 | Rahim Sadigov, Elif Yildirim, Büsra Kocaçinar, Fatma Patlar Akbulut, Cagatay Catal. Deep learning-based user experience evaluation in distance learning |
457 | -- | 476 | Qinlu He, Fan Zhang, Genqing Bian, Weiqi Zhang, Zhen Li, Zhimin Yu, Hao Feng. File block multi-replica management technology in cloud storage |
477 | -- | 497 | Liang Yang, Rong Jiang, Xuetao Pu, Chenguang Wang, Yue Yang, Meng Wang, Lin Zhang, Feifei Tian. An access control model based on blockchain master-sidechain collaboration |
499 | -- | 513 | Prashant G. Ahire, Pramod D. Patil. CAC-WOA: context aware clustering with whale optimization algorithm for knowledge discovery from multidimensional space in electricity application |
515 | -- | 529 | Haiying Liu, Kun Wu, Kuihua Huang, Guangquan Cheng, Rui Wang, Guohua Liu. Optimization of large-scale UAV cluster confrontation game based on integrated evolution strategy |
531 | -- | 546 | Nisha Pal, Mahendra Pratap Yadav, Dharmendra Kumar-Yadav. Appropriate number of analogues in analogy based software effort estimation using quality datasets |
547 | -- | 562 | Zaid Albataineh, Fatima Aldrweesh, Mohammad A. Alzubaidi. COVID-19 CT-images diagnosis and severity assessment using machine learning algorithm |
563 | -- | 573 | Lavanya Settipalli, G. R. Gangadharan, Sivaiah Bellamkonda. An extended lightweight blockchain based collaborative healthcare system for fraud prevention |
575 | -- | 587 | Abdelhak Goudjil, Mathieu Pouliquen, Eric Pigeon, Olivier Gehan. On-line outer bounding ellipsoid algorithm for clustering of hyperplanes in the presence of bounded noise |
589 | -- | 605 | Chengfeng Jian, Zhuoyang Pan, Lukun Bao, Meiyu Zhang. Online-learning task scheduling with GNN-RL scheduler in collaborative edge computing |
607 | -- | 627 | Paluck Arora, Rajesh Mehta, Rohit Ahuja. An adaptive medical image registration using hybridization of teaching learning-based optimization with affine and speeded up robust features with projective transformation |
629 | -- | 654 | Zakaria Alomari, Mohammad Al-Oudat, Suboh Alkhushayni. Pricing the cloud based on multi-attribute auction mechanism |
655 | -- | 671 | Ramesh Vatambeti, Srihari Varma Mantena, K. V. D. Kiran, M. Manohar, Chinthakunta Manjunath. Twitter sentiment analysis on online food services based on elephant herd optimization with hybrid deep learning technique |
673 | -- | 687 | Rashmi Kushwah. A novel traffic aware reliable gateway selection in wireless mesh network |
689 | -- | 705 | Bhushan Inje, Kapil Kumar Nagwanshi, Radha Krishna Rambola. An efficient document information retrieval using hybrid global search optimization algorithm with density based clustering technique |
707 | -- | 720 | Rima Grati, Faiza Loukil, Khouloud Boukadi, Mourad Abed. A blockchain-based framework for circular end-of-life vehicle processing |
721 | -- | 735 | Shamsher Ullah, Jiangbin Zheng, Muhammad Tanveer Hussain, Muhammad Wasif Sardar, Muhammad Umar Farooq 0002, Salabat Khan. An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing |
737 | -- | 760 | Sofian Kassaymeh, Mohammed Alweshah, Mohammed Azmi Al-Betar, Abdelaziz I. Hammouri, Mohammad Atwah Al-Ma'aitah. Software effort estimation modeling and fully connected artificial neural network optimization using soft computing techniques |
761 | -- | 785 | Rayees Ahamad, Kamta Nath Mishra. Hybrid approach for suspicious object surveillance using video clips and UAV images in cloud-IoT-based computing environment |
787 | -- | 825 | Nazli Gulum Mutlu, Serkan Altuntas. Analyzing factors influencing the severity of occupational accidents in textile industry using decision tree algorithms |
827 | -- | 843 | Mahshid Rezakhani, Nazanin Sarrafzadeh-Ghadimi, Reza Entezari-Maleki, Leonel Sousa, Ali Movaghar 0001. Energy-aware QoS-based dynamic virtual machine consolidation approach based on RL and ANN |
845 | -- | 858 | Mansoureh Zare, Yasser Elmi Sola, Hesam Hasanpour. Imperialist competitive based approach for efficient deployment of IoT services in fog computing |
859 | -- | 873 | Mingliang Gao 0001, Alireza Souri, Mayram Zaker, Wenzhe Zhai, Xiangyu Guo, Qilei Li. A comprehensive analysis for crowd counting methodologies and algorithms in Internet of Things |
875 | -- | 891 | Assia Brighen, Hachem Slimani, Abdelmounaam Rezgui, Hamamache Kheddouci. A new distributed graph coloring algorithm for large graphs |
893 | -- | 912 | Muhammad Faraz Hyder, Tasbiha Fatima, Saadia Arshad. Towards adding digital forensics capabilities in software defined networking based moving target defense |
913 | -- | 930 | Jiahui Ma, Jinxiang Chen, Ligang Dong, Xian Jiang. Research on placement of distributed SDN multiple controllers based on IAVOA |
931 | -- | 944 | Gunaganti Sravanthi, Nageswara Rao Moparthi. Dual Interactive Wasserstein Generative Adversarial Network optimized with arithmetic optimization algorithm-based job scheduling in cloud-based IoT |
945 | -- | 958 | Sarah Alhozaimy, Daniel A. Menascé, Massimiliano Albanese. Design and modeling of moving target defense in workflow-based applications |
959 | -- | 976 | Poly Sil Sen, Nandini Mukherjee. An ontology-based approach to designing a NoSQL database for semi-structured and unstructured health data |
977 | -- | 996 | Hela Taktak, Khouloud Boukadi, Firas Zouari, Chirine Ghedira Guégan, Michael Mrissa, Faïez Gargouri. A knowledge-driven service composition framework for wildfire prediction |
997 | -- | 1015 | Debadatta Naik, Ramesh Dharavath, Lianyong Qi. Quantum-PSO based unsupervised clustering of users in social networks using attributes |
1017 | -- | 1046 | Tianqi Bu, Zanyu Huang, Kairui Zhang, Yang Wang, Haobin Song, Jietong Zhou, Zhangjun Ren, Sen Liu. Task scheduling in the internet of things: challenges, solutions, and future trends |
1047 | -- | 1061 | Jasleen Kaur, Rinkle Rani, Nidhi Kalra. Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS |
1063 | -- | 1087 | Ridhima Rani, Neeraj Kumar 0001, Meenu Khurana. Redundancy elimination in IoT oriented big data: a survey, schemes, open challenges and future applications |
1089 | -- | 1108 | Alper Ozcan, Ahmet Kasif, Ismail Veli Sezgin, Cagatay Catal, Muhammad Sanwal, Hasan Merdun. Deep learning-based modelling of pyrolysis |
1109 | -- | 1123 | Rong Gong, Delun Li, Lila Hong, Ningxin Xie. Task scheduling in cloud computing environment based on enhanced marine predator algorithm |
1125 | -- | 1136 | Lei Zeng, Shadi G. Alawneh, Seyed Ali Arefifar. Parallel multi-GPU implementation of fast decoupled power flow solver with hybrid architecture |
1137 | -- | 1158 | Huifang Li 0002, Bing Chen, Jingwei Huang, Julio Ruben Cañizares Abreu, Senchun Chai, Yuanqing Xia. Mutation-driven and population grouping PRO algorithm for scheduling budget-constrained workflows in the cloud |