13421 | -- | 13433 | Gaoqiang Dong, Jia Wang, Mingjing Wang, Tingting Su. An improved scheduling with advantage actor-critic for Storm workloads |
13435 | -- | 13453 | Junnan Liu, Yifan Liu, Yongkang Ding. Research and optimization of task scheduling algorithm based on heterogeneous multi-core processor |
13455 | -- | 13469 | Sabina Priyadarshini, Tukaram Namdev Sawant, Gitanjali Bhimrao Yadav, J. Premalatha, Sanjay R. Pawar. Enhancing security and scalability by AI/ML workload optimization in the cloud |
13471 | -- | 13515 | Mohammad H. Nadimi-Shahraki, Shokooh Taghian, Danial Javaheri, Ali Safaa Sadiq, Nima Khodadadi, Seyedali Mirjalili. MTV-SCA: multi-trial vector-based sine cosine algorithm |
13517 | -- | 13530 | Jie Zhou, Runxin Zhang. A weighted multi-view clustering via sparse graph learning |
13531 | -- | 13546 | Muhammed Tmeizeh, Carlos Rodríguez-Domínguez, María Visitación Hurtado-Torres. File chunking towards on-chain storage: a blockchain-based data preservation framework |
13547 | -- | 13564 | Yi Jiang, Jin Xue, Kun Hu, Tianxiang Chen, Tong Wu. Saver: a proactive microservice resource scheduling strategy based on STGCN |
13565 | -- | 13582 | Feng Xia, Wenhao Cheng. A survey on privacy-preserving federated learning against poisoning attacks |
13583 | -- | 13606 | Yigit Çagatay Kuyu, Fahri Vatansever. A hybrid approach of ALNS with alternative initialization and acceptance mechanisms for capacitated vehicle routing problems |
13607 | -- | 13620 | Mohammad Fraiwan, Natheer Khasawneh. Visual identification of sleep spindles in EEG waveform images using deep learning object detection (YOLOv4 vs YOLOX) |
13621 | -- | 13641 | Rahul Mishra 0002, Dharavath Ramesh, Nazeeruddin Mohammad, Bhaskar Mondal. Blockchain enabled secure pharmaceutical supply chain framework with traceability: an efficient searchable pharmachain approach |
13643 | -- | 13673 | Essam H. Houssein, Mohammed R. Saad, Youcef Djenouri, Gang Hu, Abdelmgeid A. Ali, Hassan Shaban. Metaheuristic algorithms and their applications in wireless sensor networks: review, open issues, and challenges |
13675 | -- | 13691 | Pranav Shrivastava, Bashir Alam, Mansaf Alam. An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing |
13693 | -- | 13715 | Yingying Ning, Jing Li, Ming Zhu, Chuanxi Liu. Service selection based on blockchain smart contracts in cloud-edge environment |
13717 | -- | 13736 | Yahya M. Tashtoush, Moayyad Alajlouni, Firas AlBalas, Omar A. Darwish. Exploring low-level statistical features of n-grams in phishing URLs: a comparative analysis with high-level features |
13737 | -- | 13748 | Nouha Arfaoui, Amel Ksibi, Nouf Abdullah Almujally, Ridha Ejbali. Empowering e-learning approach by the use of federated edge computing |
13749 | -- | 13762 | Sangeeta Sharma, Priyanka Verma, Nitesh Bharot, Amish Ranpariya, Rakesh Porika. PULSE: Proactive uncovering of latent severe anomalous events in IIoT using LSTM-RF model |
13763 | -- | 13775 | Logesh Rajendran, Virendra Singh Shekhawat. Deep Convolutional Neural Network with a Fuzzy (DCNN-F) technique for energy and time optimized scheduling of cloud computing |
13777 | -- | 13793 | Adda Boualem, Marwane Ayaida, Cyril De Runz, Hisham A. Kholidy, Hichem Sedjelmaci. Sm-vsn-3c: a new Starlings model-based virtual sensor networks for coverage, connectivity, and data ccommunication |
13795 | -- | 13808 | Xiaohui Huang, Junyang Wang, Yuan Jiang, Yuanchun Lan. Multi-attention gated temporal graph convolution neural Network for traffic flow forecasting |
13809 | -- | 13834 | Ankit Sharma, Kriti Bhushan. A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks |
13835 | -- | 13869 | Rui Zhong, Yuefeng Xu, Chao Zhang 0030, Jun Yu 0012. Leveraging large language model to generate a novel metaheuristic algorithm with CRISPE framework |
13871 | -- | 13896 | Kashif Mehboob Khan, Junaid Arshad, Darakhshan Saleem, Mohammed Alsadi, Shabir Ahmad, Marvi Jokhio. TruPro: a blockchain-based decentralised prosumer electricity trading platform for electrical vehicles (EVs) |
13897 | -- | 13917 | Ahmad Heydariyan, Farhad Soleimanian Gharehchopogh, Mohammad Reza Ebrahimi Dishabi. A hybrid multi-objective algorithm based on slime mould algorithm and sine cosine algorithm for overlapping community detection in social networks |
13919 | -- | 13944 | Akhil Chaurasia, Alok Kumar, Udai Pratap Rao. BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment |
13945 | -- | 14004 | Shuhui Hao, Changcheng Huang, Ali Asghar Heidari, Huiling Chen 0001, Guoxi Liang. An improved weighted mean of vectors optimizer for multi-threshold image segmentation: case study of breast cancer |
14005 | -- | 14035 | Gang Chen, Hu Sun. Multi-strategy improved sparrow search algorithm based on first definition of ellipse and group co-evolutionary mechanism for engineering optimization problems |
14037 | -- | 14048 | Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath, Sihem Mesnager. An efficient quantum oblivious transfer protocol |
14049 | -- | 14093 | Seyed Hossein Seyed Ebrahimi, Kambiz Majidzadeh, Farhad Soleimanian Gharehchopogh. A principal label space transformation and ridge regression-based hybrid gorilla troops optimization and jellyfish search algorithm for multi-label classification |
14095 | -- | 14112 | Amir Moradi, Fatemeh Rezaei. Intelligent and efficient task caching for mobile edge computing |
14113 | -- | 14130 | Maher Alharby, Ali Alssaiari, Saad Alateef, Nigel Thomas, Aad van Moorsel. A quantitative analysis of the security of PoW-based blockchains |
14131 | -- | 14148 | Sourav, Rifaqat Ali. Lattice-based ring signcryption scheme for smart healthcare management |
14149 | -- | 14166 | Arezoo Ghasemi, Amin Keshavarzi. Energy-efficient virtual machine placement in heterogeneous cloud data centers: a clustering-enhanced multi-objective, multi-reward reinforcement learning approach |
14167 | -- | 14183 | Huaiyu Guo, Donglin Zhu, Changjun Zhou, Chengye Zou. DNA sequences design under many objective evolutionary algorithm |
14185 | -- | 14229 | Boli Zheng, Yi Chen 0023, Chaofan Wang, Ali Asghar Heidari, Lei Liu, Huiling Chen 0001, Xiaowei Chen, Peirong Chen. Stochastic biogeography-based learning improved RIME algorithm: application to image segmentation of lupus nephritis |
14231 | -- | 14245 | Xiaoxiao Liu, Yan Zhao, Shigang Wang, Jian Wei. G-SAM: GMM-based segment anything model for medical image classification and segmentation |
14247 | -- | 14267 | Walid K. Ghamry, Suzan Shukry. Channel estimation for RIS-aided MIMO systems in MmWave wireless communications with a few active elements |
14269 | -- | 14282 | Lin-Tao Duan, Jin Wang, Hai-Ying Wang. An energy-aware ant colony optimization strategy for virtual machine placement in cloud computing |
14283 | -- | 14294 | Avuthu Avinash Reddy, Ramesh Babu Battula, Dinesh Gopalani. Performance analysis of ML models on 5G sub-6 GHz bands: An experimental study |
14295 | -- | 14313 | Behaylu Tadele Alemu, Alemu Jorgi Muhammed, Habtamu Molla Belachew, Mulatu Yirga Beyene. A comprehensive detection and mitigation mechanism to protect SD-IoV systems against controller-targeted DDoS attacks |
14315 | -- | 14364 | Essam H. Houssein, Marwa M. Emam, Narinder Singh, Nagwan M. Abdel Samee, Maali Alabdulhafith, Emre Çelik. An improved honey badger algorithm for global optimization and multilevel thresholding segmentation: real case with brain tumor images |
14365 | -- | 14385 | Essam H. Houssein, Asmaa Hammad, Nagwan M. Abdel Samee, Manal Abdullah Alohali, Abdelmgeid A. Ali. TFCNN-BiGRU with self-attention mechanism for automatic human emotion recognition using multi-channel EEG data |
14387 | -- | 14415 | Bhabani Sankar Samantray, K. Hemant Kumar Reddy. Blockchain enabled secured, smart healthcare system for smart cities: a systematic review on architecture, technology, and service management |
14417 | -- | 14449 | Bilal H. Abed-alguni, Basil M. Alzboun, Noor Aldeen Alawad. BOC-PDO: an intrusion detection model using binary opposition cellular prairie dog optimization algorithm |
14451 | -- | 14468 | Preetesh Purohit, Anuradha Purohit, Vrinda Tokekar. Localization of try block and generation of catch block to handle exception using an improved LSTM |
14469 | -- | 14514 | Chuan Li, Yanjie Zhu. A hybrid butterfly and Newton-Raphson swarm intelligence algorithm based on opposition-based learning |
14515 | -- | 14538 | Hong Huang, Yu Wang, Yue Cai, Hong Wang. A novel approach for energy consumption management in cloud centers based on adaptive fuzzy neural systems |
14539 | -- | 14556 | Feiyan Guo, Bing Tang, Ying Wang, Xiaoqing Luo. Vehicle edge server deployment based on reinforcement learning in cloud-edge collaborative environment |
14557 | -- | 14584 | Reham R. Mostafa, Fatma A. Hashim, Amit Chhabra, Ghaith Manita, Yaning Xiao. Empowering bonobo optimizer for global optimization and cloud scheduling problem |
14585 | -- | 14609 | Shabnam Bawa, Prashant Singh Rana, Rajkumar Tekchandani. Migration of containers on the basis of load prediction with dynamic inertia weight based PSO algorithm |
14611 | -- | 14635 | Mostafa Abodawood, Abeer Twakol Khalil, Hanan M. Amer, Mohamed Maher Ata. Enhancing image encryption using chaotic maps: a multi-map approach for robust security and performance optimization |
14637 | -- | 14668 | Amir Pakmehr, Andreas Aßmuth, Negar Taheri, Ali Ghaffari. DDoS attack detection techniques in IoT networks: a survey |
14669 | -- | 14684 | Zhe Wang, Shuangbai He, Guoan Li. Secure speech-recognition data transfer in the internet of things using a power system and a tried-and-true key generation technique |
14685 | -- | 14727 | Xinyi Chen, Mengjian Zhang, Ming Yang 0030, Deguang Wang. A multi-strategy improved beluga whale optimization algorithm for constrained engineering problems |
14729 | -- | 14744 | Mazahir Hussain, Buseung Cho. HPTCollector: high-performance telemetry collector |
14745 | -- | 14766 | Essam H. Houssein, Gaber M. Mohamed, Youcef Djenouri, Yaser Maher Wazery, Ibrahim A. Ibrahim. Nature inspired optimization algorithms for medical image segmentation: a comprehensive review |
14767 | -- | 14810 | Mohamed A. Elseify, Salah Kamel, Loai Nasrat. An improved moth flame optimization for optimal DG and battery energy storage allocation in distribution systems |
14811 | -- | 14834 | Narender Reddy Kampelli, B. N. Bhandari. A scalable and power efficient MAC protocol with adaptive TDMA for M2M communication |
14835 | -- | 14890 | Arpita Srivastava, Ditipriya Sinha. PSO-ACO-based bi-phase lightweight intrusion detection system combined with GA optimized ensemble classifiers |
14891 | -- | 14949 | Jinge Shi, Yi Chen 0023, Zhennao Cai, Ali Asghar Heidari, Huiling Chen 0001, Qiuxiang He. Multi-threshold image segmentation using a boosted whale optimization: case study of breast invasive ductal carcinomas |
14951 | -- | 14975 | Sumit Sharma 0007, Sarika Jain 0001. OntoXAI: a semantic web rule language approach for explainable artificial intelligence |
14977 | -- | 15002 | Jamil Alshaqsi, Wenjia Wang, Osama Drogham, Rami S. Alkhawaldeh. Quantitative and qualitative similarity measure for data clustering analysis |