Journal: Cluster Computing

Volume 27, Issue 9

11839 -- 11850Atul Barve, Pushpinder Singh Patheja. A hybrid deep learning based enhanced and reliable approach for VANET intrusion detection system
11851 -- 11872Abhishek Srivastava, Dushmanta Kumar Das, Siseyiekuo Khatsu. Optimal power scheduling of microgrid considering renewable sources and demand response management
11873 -- 11889G. Sucharitha, Deepthi Godavarthi, Janjhyam Venkata Naga Ramesh, M. Ijaz Khan. Secure and efficient content-based image retrieval using dominant local patterns and watermark encryption in cloud computing
11891 -- 11909Yayin He, Xiangshun Li. Causal network construction based on KICA-ECCM for root cause diagnosis of industrial processes
11911 -- 11952Mengjian Zhang, Guihua Wen, Pei Yang 0001. Chaos-BBO: Chaos balanced butterfly optimizer with dynamic continuum chaotic strategies and its applications
11953 -- 11981Sasidharan Velu, Sukhpal Singh Gill, Subramaniam Subramanian Murugesan, Huaming Wu, Xingwang Li. CloudAIBus: a testbed for AI based cloud computing environments
11983 -- 12005Ashish Kumari, Shailender Kumar, Ram Shringar Raw. Modified clustering and incentivized stable CH selection for reliable VANET communication
12007 -- 12027Jiao Li, Wanting Zhao. Blockchain cross-chain protocol based on improved hashed time-locked contract
12029 -- 12068V. R. Rajasekar, S. Rajkumar 0001. DSAT-IDS: Dissimilarity and Adaptive Threshold-based Intrusion Detection system to mitigate selective forwarding attack in the RPL-based 6LoWPAN
12069 -- 12089Hui Zeng, Qiang Cui, Xiaohui Huang, Xuewei Duan. STTD: spatial-temporal transformer with double recurrent graph convolutional cooperative network for traffic flow prediction
12091 -- 12102Yuhong Sun, Jiatao Wang, Fengyin Li. Efficient integer division computation protocols based on partial homomorphic encryption
12103 -- 0Yuhong Sun, Jiatao Wang, Fengyin Li. Correction: Efficient integer division computation protocols based on partial homomorphic encryption
12105 -- 12121Xiaoping Zhao, Qianqian Su. Time-limited ownership delegation scheme with revocation security for healthcare
12123 -- 12140Xin Li. A faster deep graph clustering network based on dynamic graph weight update mechanism
12141 -- 12184Taief Alaa Alamiedy, Mohammed Anbar, Bahari Belaton. OPSMOTE-ML: an optimized SMOTE with machine learning models for selective forwarding attack detection in low power and lossy networks of internet of things
12185 -- 12207Ruchika Malhotra, Kishwar Khan. A novel software defect prediction model using two-phase grey wolf optimisation for feature selection
12209 -- 12238Rui Zhong, Jun Yu. A novel evolutionary status guided hyper-heuristic algorithm for continuous optimization
12239 -- 12266Rui Zhong, Jun Yu. 2: differential evolution architecture based adaptive hyper-heuristic algorithm for continuous optimization
12267 -- 12282Burhan Sher, Mustafeez Ahmad, Khwaja Mansoor, Yawar Abbas Bangash, Waseem Iqbal 0001, Shynar Mussiraliyeva. Lightweight secure authentication protocol for automatic dependent surveillance broadcast system
12283 -- 12309Feifan Wang, Nuojing Liang, Faguo Wu, Bo Zhou, Jiawei Nie, Xiao Zhang. Three-party evolutionary game-based analysis and stability enhancement of improved PBFT consensus mechanism
12311 -- 12322Wenlong Zhao, Yuanchao Hu, Xiaopeng Yan, Xiaowei Liu, Rixian Ding, Chaofeng Dai, Ying Cao. Enhanced K-NN with Bayesian optimization algorithm for predicting energy efficiency of smart grids in IoT
12323 -- 12340Chengang Dong, Yuhao Tang, Liyan Zhang. MDA-YOLO Person: a 2D human pose estimation model based on YOLO detection framework
12341 -- 12359D. Praveena Anjelin, S. Ganesh Kumar. An effective classification using enhanced elephant herding optimization with convolution neural network for intrusion detection in IoMT architecture
12361 -- 12393Haobin Zhang, Hongjun San, Jiupeng Chen, Haijie Sun, Lin Ding, Xingmei Wu. Black eagle optimizer: a metaheuristic optimization method for solving engineering optimization problems
12395 -- 12410Carlos Melo, Glauber D. Gonçalves, Francisco Airton Silva, André Soares 0001. A comprehensive hyperledger fabric performance evaluation based on resources capacity planning
12411 -- 12457Si-Wen Zhang, Jie-Sheng Wang, Shi-Hui Zhang, Yu-Xuan Xing, Yun-Cheng Sun, Yuan-Zheng Gao. Task scheduling in cloud computing systems using honey badger algorithm with improved density factor and foucault pendulum motion
12459 -- 12481Sheharyar Khan, Jiangbin Zheng, Hassan Ali. Soft computing approaches for dynamic multi-objective evaluation of computational offloading: a literature review
12483 -- 12508Rui Zhong, Jun Yu 0012. Gene-targeting multiplayer battle game optimizer for large-scale global optimization via cooperative coevolution
12509 -- 12526Kandoussi el Mehdi, Adam Houmairi, Iman El Mir, Mostafa Bellafkih. Enhancing cloud security: harnessing bayesian game theory for a dynamic defense mechanism
12527 -- 12545Xiaohua Wu, Jinpeng Chang, Zirui Wang, Jun Cheng. DyPoA: enhanced PoA protocol with a dynamic set of validators for IoT
12547 -- 12568Guilherme Galante, Rodrigo Da Rosa Righi, Cristiane de Andrade. Extending parallel programming patterns with adaptability features
12569 -- 12602Li Yuan, Xiongjun Tian, Jiacheng Yuan, Jingyu Zhang, Xiaojing Dai, Ali Asghar Heidari, Huiling Chen 0001, Sudan Yu. Enhancing network security with information-guided-enhanced Runge Kutta feature selection for intrusion detection
12603 -- 12626Kavitha Dhanushkodi, Raushan Kumar, Pratyush Mittal, Saumye Saran Das, Neelam Naga Saivenkata Suryavenu, Kiruthika Venkataramani. Enhancing resource utilization and privacy in IoT data placement through fuzzy logic and PSO optimization
12627 -- 12648Anas M. R. Alsobeh, Khalid Gaber, Mahmoud M. Hammad, Maryam Nuser, Amani M. Shatnawi. Android malware detection using time-aware machine learning approach
12649 -- 12668Fatma Hendaoui, Hamdi Eltaief, Habib Youssef. Enhancing data authentication in software-defined networking (SDN) using multiparty computation
12669 -- 12688Yun Sun, Yu Li, Weihang Zhang, Fengju Zhang, Hanruo Liu, Ningli Wang, Huiqi Li. Automatic diagnosis of myopic maculopathy using continuous severity ranking labels
12689 -- 12706Wei Hu, Ji Feng, Degang Yang. An improved density peaks clustering algorithm using similarity assignment strategy with K-nearest neighbors
12707 -- 12725Krishna Kant Agrawal, Devesh Mishra, Nitin Kumar Gaur, Vandana Yadav, Brijesh Mishra. Machine learning driven four-elements high gain MIMO antenna for wireless connectivity
12727 -- 12743Qun Zhou, Wenting Shen. PPFLV: privacy-preserving federated learning with verifiability
12745 -- 12786Ali Mohammadzadeh, Seyedali Mirjalili. Eel and grouper optimizer: a nature-inspired optimization algorithm
12787 -- 12797Alparslan Fisne, M. Mücahit Enes Yurtsever, Süleyman Eken. Energy-efficient buildings with energy-efficient optimized models: a case study on thermal bridge detection
12799 -- 12819Essam H. Houssein, Doaa A. Abdelkareem, Gang Hu, Mohamed Abdel-Hameed, Ibrahim A. Ibrahim, Mina Younan. An effective multiclass skin cancer classification approach based on deep convolutional neural network
12821 -- 12839Mamatha Maddu, Yamarthi Narasimha Rao. Res2Net-ERNN: deep learning based cyberattack classification in software defined network
12841 -- 12860R. Shanmugapriya, S. V. N. Santhosh Kumar. SCIDP-Secure cloud-integrated data dissemination protocol for efficient reprogramming in internet of things
12861 -- 12874Mohammad Yekta, Hadi Shahriar Shahhoseini. SCRUB: a novel energy-efficient virtual machines selection and migration scheme in cloud data centers
12875 -- 12897Huanlong Zhang, Chenglin Guo, Jianwei Zhang 0014, Xin Wang, Jiaxiang Zhang. An improved Tasmanian devil optimization algorithm based on sine-cosine strategy with dynamic weighting factors
12899 -- 12917Liji Luo, Siwei Wei, Hua Tang, Chunzhi Wang. An effective partition-based framework for virtual machine migration in cloud services
12919 -- 12942Manoj Aggarwal, Pritam Rani, Prity Rani, Pratima Sharma. Revolutionizing agri-food supply chain management with blockchain-based traceability and navigation integration
12943 -- 12963B. Dhanalaxmi, Yeligeti Raju, B. Saritha, N. Sabitha, Namita Parati, Kandula Damodhar Rao. OptFBFN: IOT threat mitigation in software-defined networks based on fuzzy approach
12965 -- 12981Abdelkarim Ben Sada, Amar Khelloufi, Abdenacer Naouri, Huansheng Ning, Sahraoui Dhelim. Hybrid metaheuristics for selective inference task offloading under time and energy constraints for real-time IoT sensing systems
12983 -- 13003Nisha Pal, Dharmendra Kumar-Yadav. Modeling and verification of software evolution using bigraphical reactive system
13005 -- 13027Xiwen Qin, Siqi Zhang, Xiaogang Dong, Hongyu Shi, Liping Yuan. Improved aquila optimizer with mRMR for feature selection of high-dimensional gene expression data
13029 -- 13046Wei Zhao, Weiming Gao, Shengnan Gao, Chenmei Teng, Xiaoya Zhu. Quantum competitive decision algorithm for the emergency siting problem under given deadline conditions
13047 -- 13074Rashmi Keshri, Deo Prakash Vidyarthi. Energy-efficient communication-aware VM placement in cloud datacenter using hybrid ACO-GWO
13075 -- 13091Y. Sreenivasa Rao, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath. Designing quantum-secure attribute-based encryption
13093 -- 13128Abdelazim G. Hussien, Amit Chhabra, Fatma A. Hashim, Adrian Pop. A novel hybrid Artificial Gorilla Troops Optimizer with Honey Badger Algorithm for solving cloud scheduling problem
13129 -- 13164Ankit Kumar Jain, Hariom Shukla, Diksha Goel. A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks
13165 -- 13185Jun Wang, Ze Luo, Chenglong Wang. A two-way trust routing scheme to improve security in fog computing environment
13187 -- 13202Yilin Li, YanXian Bi, Jian Wang 0010, Zhiqiang Li, Hongxia Zhang, Peiying Zhang. Unmanned aerial vehicle assisted communication: applications, challenges, and future outlook
13203 -- 13237Changjun Wu, Qingzhen Li, Qiaohua Wang, Huanlong Zhang, Xiaohui Song. A hybrid northern goshawk optimization algorithm based on cluster collaboration
13239 -- 13255Gholam Reza Zargar, Hamid Barati, Ali Barati. An authentication mechanism based on blockchain for IoT environment
13257 -- 13272Ning Sha, Xiaochun Wu, Jinpeng Wen, Jinglei Li, Chuanhuang Li. Adaptive spatio-temporal graph convolutional network with attention mechanism for mobile edge network traffic prediction
13273 -- 13294Debashreet Das, Sayak Sengupta, Shashank Mouli Satapathy, Deepanshu Saini. HOGWO: a fog inspired optimized load balancing approach using hybridized grey wolf algorithm
13295 -- 13332Heming Jia, Qixian Wen, Yuhao Wang, Seyedali Mirjalili. Catch fish optimization algorithm: a new human behavior algorithm for solving clustering problems
13333 -- 13352Yongxing Lin, Xiaoyan Xu, Hongyun Xu. A revolutionary approach to use convolutional spiking neural networks for robust intrusion detection
13353 -- 13377Mazhar Hussain, Said Nabi, Mushtaq Hussain. RAPTS: resource aware prioritized task scheduling technique in heterogeneous fog computing environment
13379 -- 13393Yunfa Li 0001, Hui Li. A novel real-time object detection method for complex road scenes based on YOLOv7-tiny
13395 -- 13405Ilhem Salah, Khaled Jouini, Cyril-Alexandre Pachon, Ouajdi Korbaa. Connecting the dots between stance and fake news detection with blockchain, proof of reputation, and the Hoeffding bound
13407 -- 13419Mostafa Raeisi-Varzaneh, Omar Dakkak, Yousef Fazea, Mohammed Golam Kaosar. Advanced cost-aware Max-Min workflow tasks allocation and scheduling in cloud computing systems

Volume 27, Issue 8

10235 -- 10244Alper Alimoglu, Can C. Özturan. An autonomous blockchain-based workflow execution broker for e-science
10245 -- 10264Zigang Chen, Fan Liu, Danlong Li, Yuhong Liu, Xingchun Yang, Haihua Zhu. Video security in logistics monitoring systems: a blockchain based secure storage and access control scheme
10265 -- 10298Navid Khaledian, Marcus Völp, Sadoon Azizi, Mirsaeid Hosseini Shirvani. AI-based & heuristic workflow scheduling in cloud and fog computing: a systematic review
10299 -- 10324Takwa Allaoui, Kaouther Gasmi, Tahar Ezzedine. Reinforcement learning based task offloading of IoT applications in fog computing: algorithms and optimization techniques
10325 -- 10342Mamta Narwaria, Shruti Jaiswal. Multicriteria client selection model using class topper optimization based optimal federated learning for healthcare informatics
10343 -- 10357Xu Yang, Feiyang Wu, Linqiu Gui, Shengshi Zhong. A tube-based model predictive control method for intelligent vehicles path tracking
10359 -- 10375Ala Mughaid, Asma Alnajjar, Subhieh M. El-Salhi, Khaled Almakadmeh, Shadi AlZu'bi. A cutting-edge intelligent cyber model for intrusion detection in IoT environments leveraging future generations networks
10377 -- 10419Mahdieh Maazalahi, Soodeh Hosseini. K-means and meta-heuristic algorithms for intrusion detection systems
10421 -- 10435Xing Huang, Li Li, Wei Wang, Lu Liu, Meng Li. Intelligent patrol inspection of low code enabled electric power communication equipment based on digital transformation
10437 -- 10453Xiaolong Zhao, Zhenjie Huang. Fully outsourced and fully verifiable attribute-based encryption for cloud data sharing
10455 -- 10466Sahar Cherif, Hamdi Kchaou, Amel Ksibi, Ghadah Aldehim. Medical diagnosis using interval type-2 fuzzy similarity measures
10467 -- 10485Gökçe Karacayilmaz, Harun Artuner. A novel approach detection for IIoT attacks via artificial intelligence
10487 -- 10523Malik Braik, Mohammed A. Awadallah 0001, Hussein Alzoubi, Heba Al-Hiary, Abdelazim G. Hussien. Adaptive dynamic elite opposition-based Ali Baba and the forty thieves algorithm for high-dimensional feature selection
10525 -- 10552Kajol Mittal, Payal Khurana Batra. Graph-ensemble fusion for enhanced IoT intrusion detection: leveraging GCN and deep learning
10553 -- 10567Xiaofei Zhao, Mengqian Yang, Hongji Yang. A knowledge graph embedding model based on multi-level analogical reasoning
10569 -- 10588Piyush Sewal, Hari Singh. Performance optimization of Spark MLlib workloads using cost efficient RICG model on exponential projective sampling
10589 -- 10631Nima Khodadadi, Ehsan Khodadadi, Benyamin Abdollahzadeh, El-Sayed M. El-Kenawy, Pezhman Mardanpour, Weiguo Zhao 0001, Farhad Soleimanian Gharehchopogh, Seyedali Mirjalili. Multi-objective generalized normal distribution optimization: a novel algorithm for multi-objective problems
10633 -- 10652Jhuma Dutta, Subhas Barman, Soubhik Sen, Aniruddha Routh, Matangini Chattopadhyay, Samiran Chattopadhyay. Easypay: a user-friendly blockchain-powered payment gateway
10653 -- 10670Swathi Baswaraju, Soma Sekhar Kolisetty, G. Venkata Sivanarayana, Srinivasa Rao Battula. Efficientnetv2-RegNet: an effective deep learning framework for secure SDN based IOT network
10671 -- 10715Zhendong Wang, Donghui Dai, Zhiyuan Zeng, Daojing He, Sammy Chan. Multi-strategy enhanced Grey Wolf Optimizer for global optimization and real world problems
10717 -- 10731Safwan Omari, Kshitiz Basnet, Mohammad Wardat. Investigating large language models capabilities for automatic code repair in Python
10733 -- 10755Bo Wen, Shanzhi Li, Hooman Motevalli. Exploitation of healthcare IoT-fog-based smart e-health gateways: a resource optimization approach
10757 -- 10776Lei An, Jiankai Qiu, Hanzhi Zhang, Chen Liu. Design of distributed network intrusion prevention system based on Spark and P2DR models
10777 -- 10818Hongye Li, Jianan Wang, Yanjie Zhu. Integration of bat algorithm and salp swarm intelligence with stochastic difference variants for global optimization
10819 -- 10832Buqing Cao, Siyuan Wang, Xiang Xie, Qian Peng, Yating Yi, Zhenlian Peng. ARIR: an intent recognition-based approach for API recommendation
10833 -- 10858Mohsen Khademi Dehnavi, Ali Broumandnia, Mirsaeid Hosseini Shirvani, Iman Ahanian. A hybrid genetic-based task scheduling algorithm for cost-efficient workflow execution in heterogeneous cloud computing environment
10859 -- 10882Nasir Ahmad Jalali, Hongsong Chen. Comprehensive framework for implementing blockchain-enabled federated learning and full homomorphic encryption for chatbot security system
10883 -- 10897Rohit Singh, Krishna Pal Sharma, Lalit Kumar Awasthi. A machine learning-based ensemble model for securing the IoT network
10899 -- 10919Neelam Gupta, Sarvesh Tanwar, Sumit Badotra. Performance analysis of ODL and RYU controllers' against DDoS attack in software defined networks
10921 -- 10952Sumit Bansal, Himanshu Aggarwal. A multiobjective optimization of task workflow scheduling using hybridization of PSO and WOA algorithms in cloud-fog computing
10953 -- 10970Shiva Sharma, Manjit Kaur, Naresh Kumar 0002. Enhanced 3D indoor position estimation from smartphone's inbuilt IMU and pressure sensor via hybrid approach
10971 -- 10992Shristy Gupta, Amritesh Kumar, Lokendra Vishwakarma, Debasis Das 0001. Enhancing blockchain scalability and security: the early fraud detection (EFD) framework for optimistic rollups
10993 -- 11016Shabnam Bawa, Prashant Singh Rana, Rajkumar Tekchandani. Multivariate time series ensemble model for load prediction on hosts using anomaly detection techniques
11017 -- 11037Yaru Chen, Jie Zhou, Xingshi He, Xinglong Luo. An improved density peaks clustering based on sparrow search algorithm
11039 -- 11067Rahma Djiroun, Meriem Amel Guessoum, Kamel Boukhalfa, Elhadje Benkhelifa. Natural language why-question answering system in business intelligence context
11069 -- 11084Apurva Khandekar, Sheikh Fahad Ahmad. Secured IoT architecture for personalized marketing using blockchain framework with deep learning technology
11085 -- 11102Khaoula Braiki, Habib Youssef. An experimental and comparative study examining resource utilization in cloud data center
11103 -- 11118Abdullah Aljumah, Tariq Ahamed Ahanger, Imdad Ullah. Internet of things-based secure architecture to automate industry
11119 -- 11148Yu Tang, Qi Dai, Mengyuan Yang, Lifang Chen, Ye Du. Software defect prediction ensemble learning algorithm based on 2-step sparrow optimizing extreme learning machine
11149 -- 11165Hassan Harb, Mohamad Hijazi, Mohamed-el-Amine Brahmia, Ali Kadhum Idrees, Mouhammad Alakkoumi, Ali Jaber, Abdelhafid Abouaissa. An intelligent mechanism for energy consumption scheduling in smart buildings
11167 -- 11185Ananya Chakraborty, Mohit Kumar 0004, Nisha Chaurasia. An intelligent offloading and resource allocation using Fuzzy-based HHGA algorithm for IoT applications
11187 -- 11212Ishak Paçal, Omer Celik, Bilal Bayram, António Cunha. Enhancing EfficientNetv2 with global and efficient channel attention mechanisms for accurate MRI-Based brain tumor classification
11213 -- 11235Jia-Lin Chan, Wai-Kong Lee, Denis Chee-Keong Wong, Wun-She Yap, Boon-Yaik Ooi, Bok-Min Goi. High throughput acceleration of NIST lightweight authenticated encryption schemes on GPU platform
11237 -- 11247Muhammad Asad 0002, Safa Otoum. Federated learning for efficient spectrum allocation in open RAN
11249 -- 11275Amira Rayane Benamer, Nejib Ben Hadj-Alouane, Khaled Boussetta, Atidel B. Hadj-Alouane. A Genetic Algorithm-based approach for placement in the fog of latency-sensitive multiplayer game servers
11277 -- 11297Zeynep Garip, Ekin Ekinci, Kasim Serbest, Süleyman Eken. Chaotic marine predator optimization algorithm for feature selection in schizophrenia classification using EEG signals
11299 -- 11315Jian Zheng, Lin Li, Shiyan Wang, Huyong Yan. Binary classification for imbalanced datasets using twin hyperspheres based on conformal method
11317 -- 11345Bo Liu, Guo Zhou, Yongquan Zhou, Qifang Luo, Yuanfei Wei. Quantum-inspired multi-objective African vultures optimization algorithm with hierarchical structure for software requirement
11347 -- 11367Pls Jayalaxmi, Manali Chakraborty, Rahul Saha, Gulshan Kumar, Mauro Conti. MADESANT: malware detection and severity analysis in industrial environments
11369 -- 11392Sanjeev Sharma, Mahendra Pratap Yadav. A collective approach to reach known and unknown target in multi agent environment using nature inspired algorithms
11393 -- 11406Yalian Yang, Xinyu Luo, Wei Li, Changdong Liu, Qing Ye, Peng Liang. AAPF*: a safer autonomous vehicle path planning algorithm based on the improved A* algorithm and APF algorithm
11407 -- 11426Arif Ullah, Zakaria Alomari, Suboh Alkhushayni, Du'a Al-Zaleq, Mohammad Bany Taha, Hassnae Remmach. Improvement in task allocation for VM and reduction of Makespan in IaaS model for cloud computing
11427 -- 11454Medha Kirti, Ashish Kumar Maurya, Rama Shankar Yadav. Fault-tolerant allocation of deadline-constrained tasks through preemptive migration in heterogeneous cloud environments
11455 -- 11469Mingyan Li, Shuo Wang, Tao Huang, Yunjie Liu. MPTD: optimizing multi-path transport with dynamic target delay in datacenters
11471 -- 11489Mostafa Matin, Amin Mehranzadeh, Mohsen Chekin, Mohammad Mosleh. HTPA: a hybrid traffic pattern aware arbitration strategy for network on chip systems
11491 -- 11513Fazal Waris, Feipeng Da, Shanghuan Liu. Stacked ensemble learning for facial gender classification using deep learning based features extraction
11515 -- 11535Hongzhi Li, Dun Li, Wei Liang 0005. A smart contract-driven access control scheme with integrity checking for electronic health records
11537 -- 11552Tengjiao Liu. XsimGCL's cross-layer for group recommendation using extremely simple graph contrastive learning
11553 -- 11568Haodi Quan, Yun Zhang 0019, Qiaoqin Li, Yongguo Liu. TPBFS: two populations based feature selection method for medical data
11569 -- 11593Anita Thakur, Virender Ranga, Ritu Agarwal. Workload dynamics implications in permissioned blockchain scalability and performance
11595 -- 11610Xi Liu, Jun Liu, Hong Wu, Jing Dong. A family of truthful mechanisms for resource allocation with multi-attribute demand in mobile edge computing
11611 -- 11626Limin Xia, Weiye Fu. Spatial-temporal multiscale feature optimization based two-stream convolutional neural network for action recognition
11627 -- 11644Conrado P. Vizcarra, Shadan Alhamed, Abdulelah Abdallah Algosaibi, Mohammed Alnaeem, Adel Aldalbahi, Nura Aljaafari, Ahmad Sawalmeh, Mahmoud Nazzal, Abdallah Khreishah, Abdulaziz Alhumam, Muhammad Anan. Deep learning adversarial attacks and defenses on license plate recognition system
11645 -- 11665Komal Singh Gill, Sharad Saxena, Anju Sharma, Arwinder Dhillon. GTBNN: game-theoretic and bayesian neural networks to tackle security attacks in intelligent transportation systems
11667 -- 11682Peng Chen, Shengwei Tian, Xin Wang, Xinjun Pei, Weitao Nong, Hao Zhang. Efficient malware detection through inter-component communication analysis
11683 -- 11708Abdelkader Ouared, Moussa Amrani, Abdelhafid Chadli, Pierre-Yves Schobbens. Deep variability modeling to enhance reproducibility of database performance testing
11709 -- 11725Hongrui Lin, Guodong Liu, Weiwei Lin, Xinhua Wang, Xiumin Wang. A novel virtual machine consolidation algorithm with server power mode management for energy-efficient cloud data centers
11727 -- 11745Nidhi Malik, Neeti Sangwan, Navdeep Bohra, Ashish Kumari, Dinesh Sheoran, Manya Dabas. HyperSegRec: enhanced hypergraph-based recommendation system with user segmentation and item similarity learning
11747 -- 11802Behnam Mohammad Hasani Zade, Najme Mansouri, Mohammad Masoud Javidi. Multi-objective task scheduling based on PSO-Ring and intuitionistic fuzzy set
11803 -- 11821Lizia Sahkhar, Bunil Kumar Balabantaray, Sanjaya Kumar Panda. Mobility-enhanced delay-aware cloudlet movement and placement using cluster-based technique in a smart healthcare platform
11823 -- 11838Zhihe Yang, Xiaogang Wang, Rongting Li, Yangli Liu. HMM-CPM: a cloud instance resource prediction method tracing the workload trends via hidden Markov model

Volume 27, Issue 7

8639 -- 8654Lili Nemec Zlatolas, Tatjana Welzer, Lenka Lhotská. Data breaches in healthcare: security mechanisms for attack mitigation
8655 -- 8681Rafika Saadouni, Chirihane Gherbi, Zibouda Aliouat, Yasmine Harbi, Amina Khacha. Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature
8683 -- 8724Fatma Hendaoui, Ahlem Ferchichi, Lamia Trabelsi, Rahma Meddeb, Rawia Ahmed, Manel Khazri Khelifi. Advances in deep learning intrusion detection over encrypted data with privacy preservation: a systematic review
8725 -- 8788Tanya Garg, Shashank Gupta 0002, Mohammad S. Obaidat, Meghna Raj. Drones as a service (DaaS) for 5G networks and blockchain-assisted IoT-based smart city infrastructure
8789 -- 8815Wengui Hu, Qingsong Cao, Mehdi Darbandi, Nima Jafari Navimipour. A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques, challenges, and future directions
8817 -- 8864Yasar Khan, Saad Mustafa, Raja Wasim Ahmad, Tahir Maqsood, Faisal Rehman, Javid Ali, Joel J. P. C. Rodrigues. Content caching in mobile edge computing: a survey
8865 -- 8887Daisy Nkele Molokomme, Adeiza James Onumanyi, Adnan M. Abu-Mahfouz. Hybrid metaheuristic schemes with different configurations and feedback mechanisms for optimal clustering applications
8889 -- 8908Pravali Manchala, Manjubala Bisi. TSoptEE: two-stage optimization technique for software development effort estimation
8909 -- 8930Chandra Bhushan Kumar Yadav, Dinesh Dash. An efficient partial charging and data gathering strategy using multiple mobile vehicles in wireless rechargeable sensor networks
8931 -- 8938Yuxin Yang, Yihang Luo, Guangzhuo Zhu. An optimized federated learning method based on soft label grouping for heterogeneous IoT
8939 -- 8963Zahra Jafari, Ahmad Habibizad Navin, Azadeh Zamanifar. Task scheduling approach in fog and cloud computing using Jellyfish Search (JS) optimizer and Improved Harris Hawks optimization (IHHO) algorithm enhanced by deep learning
8965 -- 8982Angel M. Gama Garcia, José Maria Alcaraz Calero, Higinio Mora Mora, Qi Wang 0001. ServiceNet: resource-efficient architecture for topology discovery in large-scale multi-tenant clouds
8983 -- 8993K. Dilsad Çiçek, Taymaz Akan, Oguz Bayat. Multi-modal Battle Royale optimizer
8995 -- 9012Ratul Sikder, Md. Shohrab Hossain, Mohammed J. F. Alenazi, Mohammed Atiquzzaman. A relaxed and faster switch migration framework to balance the load of distributed control plane in software defined networks
9013 -- 9029Sunil Prajapat, Pankaj Kumar, Sandeep Kumar. A privacy preserving quantum authentication scheme for secure data sharing in wireless body area networks
9031 -- 9064Muhammad Awais, Muhammad Adnan Khan, Zia Bashir. Exploring the stochastic patterns of hyperchaotic Lorenz systems with variable fractional order and radial basis function networks
9065 -- 9089Ali Ghaffari, Nasim Jelodari, Samira pouralish, Nahideh Derakhshanfard, Bahman Arasteh. Securing internet of things using machine and deep learning methods: a survey
9091 -- 9105Mohd Akbar, Mohammed Mujtaba Waseem, Syeda Husna Mehanoor, Praveen Barmavatu. Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing
9107 -- 9121Mehmet Ulvi Simsek, Ibrahim Kök, Suat Özdemir. Cepair: an AI-powered and fog-based predictive CEP system for air quality monitoring
9123 -- 9136Reid Prichard, Wayne Strasser. When Fewer Cores Is Faster: A Parametric Study of Undersubscription in High-Performance Computing
9137 -- 9190Jianlan Wang, Zhendong Wang, Donglin Zhu, Shuxin Yang, Junling Wang, Dahai Li. Reinforcement learning marine predators algorithm for global optimization
9191 -- 9220K. A. Asmitha, Vinod Puthuvath, Rafidha Rehiman K. A., S. L. Ananth. Deep learning vs. adversarial noise: a battle in malware image analysis
9221 -- 9241Shahab Safaee, Meghdad Mirabi, Ali-Asghar Safaei. StreamFilter: a framework for distributed processing of range queries over streaming data with fine-grained access control
9243 -- 9260Sagnik Datta, Suyel Namasudra. Blockchain-based secure and scalable supply chain management system to prevent drug counterfeiting
9261 -- 9281Abdulaziz Aldaej, Tariq Ahamed Ahanger, Mohammed Atiquzzaman, Imdad Ullah. A comprehensive node-based botnet detection framework for IoT network
9283 -- 9301Heng Zhang 0002, Yihong Zhang, Yanli Liu 0005, Neal Naixue Xiong, Yawei Li 0003. Slam loop closure detection algorithm based on MSA-SG
9303 -- 9322Ruiling Tian, Yadan Xue, Yibo Hao, Yuting Song. Optimal analysis in cognitive radio networks with imperfect sensing based on retrial queues with feedback and priority
9323 -- 9344Ahmad Awan, Muhammad Aleem, Altaf Hussain, Radu Prodan. DFARM: a deadline-aware fault-tolerant scheduler for cloud computing
9345 -- 9380Essam H. Houssein, Mahmoud Khalaf Saeed, Gang Hu, Mustafa M. Al-Sayed. An efficient improved exponential distribution optimizer: application to the global, engineering and combinatorial optimization problems
9381 -- 9394Haythem Bany Salameh, Ayyoub Hussienat, Mohannad Alhafnawi, Ahmad Al Ajlouni. Autonomous UAV-based surveillance system for multi-target detection using reinforcement learning
9395 -- 9414Sujit Biswas, Rajat Subhra Goswami, K. Hemant Kumar Reddy. Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart cities
9415 -- 9431Sadananda Lingayya, Sathyendra Bhat Jodumutt, Sanjay Rangrao Pawar, Anoop Vylala, Senthilkumar Chandrasekaran. Dynamic task offloading for resource allocation and privacy-preserving framework in Kubeedge-based edge computing using machine learning
9433 -- 0Sadananda Lingayya, Sathyendra Bhat Jodumutt, Sanjay Rangrao Pawar, Anoop Vylala, Senthilkumar Chandrasekaran. Correction: Dynamic task offloading for resource allocation and privacy-preserving framework in Kubeedge-based edge computing using machine learning
9435 -- 9450Miguel Landry Foko Sindjoung, Mthulisi Velempini, Vianney Kengne Tchendji. ARPMEC: an adaptive mobile edge computing-based routing protocol for IoT networks
9451 -- 9475Ali Hosseinalipour, Reza Ghanbarzadeh, Bahman Arasteh, Farhad Soleimanian Gharehchopogh, Seyedali Mirjalili. A metaheuristic approach based on coronavirus herd immunity optimiser for breast cancer diagnosis
9477 -- 9495Najib Mouhassine, Mohamed Moughit. A mean opinion score prediction model for VoIP calls offloading handover from LTE to WiFi
9497 -- 9507Mohammed Jasim, Nazli Siasi. Hybrid-grained migration method for load redistribution in heavily-loaded fog nodes
9509 -- 9568Chengtian Ouyang, Chang-Liao, Donglin Zhu, Yangyang Zheng, Changjun Zhou, Chengye Zou. Compound improved Harris hawks optimization for global and engineering optimization
9569 -- 9585Somayeh Danesh, Javad Akbari Torkestani. CLARA: clustered learning automata-based routing algorithm for efficient FANET communication
9587 -- 9613Çigdem Avci Salma, Bedir Tekinerdogan, Cagatay Catal. Design tactics for tailoring transformer architectures to cybersecurity challenges
9615 -- 9634Zhao Xu, Zhiyang Jia, Yiwei Wei, Shuyan Zhang, Zhong Jin, Wenpei Dong. CSDANet: a new lightweight fault diagnosis framework towards heavy noise and small samples
9635 -- 9661Zaid Mustafa, Rashid Amin, Hamza Aldabbas, Naeem Ahmed. Intrusion detection systems for software-defined networks: a comprehensive study on machine learning-based techniques
9663 -- 9678Chengang Dong, Yuhao Tang, Hanyue Zhu, Liyan Zhang. HCA-YOLO: a non-salient object detection method based on hierarchical attention mechanism
9679 -- 9692Jaehwan Park, Zeinab Rezaeifar, Changhee Hahn. Securing multi-client range queries over encrypted data
9693 -- 9714Hui Zeng, Xuewei Duan, Xiaohui Huang, Qiang Cui. STA-former: encoding traffic flows with spatio-temporal associations in transformer networks for prediction
9715 -- 9734Huangshui Hu, Xinji Fan, Chuhang Wang, Wang Tingting, Yuhuan Deng. Particle swarm optimization and fuzzy logic based clustering and routing protocol to enhance lifetime for wireless sensor networks
9735 -- 9755Arthur Sabino, Luiz Nelson Lima, Carlos Brito 0001, Leonel Feitosa, Marcos F. Caetano, Priscila Solís Barreto, Francisco Airton Silva. Forest fire monitoring system supported by unmanned aerial vehicles and edge computing: a performance evaluation using petri nets
9757 -- 9782Arjun Singh, Preeti Mishra, P. Vinod 0001, Avantika Gaur, Mauro Conti. SFC-NIDS: a sustainable and explainable flow filtering based concept drift-driven security approach for network introspection
9783 -- 9794Wei Sun 0020, Lang Li, Xiantong Huang. LTLBC: a low-latency lightweight block cipher for internet of things
9795 -- 9810Cheng Wang, Lin Chen, Chengjie Tang, Yongsong Wang, Yaqiao Xian, Yuhao Zhao, Hai Xue, Zhan Huan. Enhanced time-sensitive networking configuration detection using optimized BPNN with feature selection for industry 4.0
9811 -- 9835Mohd Ahsan Siddiqui, C. Rama Krishna, Mala Kalra. Anomaly detection framework for IoT-enabled appliances using machine learning
9837 -- 9849Ying Shen, Zhanyou Ma, Zishu Jiang, YaHui Li, Guoli Qin. Performance analysis of P2P network based on differentiated service Geo/Geo/1 + 1 queue
9851 -- 9871Wael Khalafalla, Wen-xing Zhu, Ahmed Elkhalil, Issameldeen Elfadul. Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs
9873 -- 9885Posham Bhargava Reddy, Chapram Sudhakar. IOTD: intelligent offloading of tasks with deadlines in edge-fog-cloud computing environment using hybrid approach
9887 -- 9915Fengxian Wang, Senlin Bi, Shaozhi Feng, Huanlong Zhang, Chenglin Guo. Combined economic and emission power dispatch problems through multi-objective Honey Badger optimizer
9917 -- 9935Elsayed Elsedimy, Hala Elhadidy, Sara M. M. Abo Hashish. A novel intrusion detection system based on a hybrid quantum support vector machine and improved Grey Wolf optimizer
9937 -- 9956Meng Cui, Jue Chen, Xihe Qiu, Wenjing Lv, Haijun Qin, Xinyu Zhang. Multi-class intrusion detection system in SDN based on hybrid BiLSTM model
9957 -- 9973Kai Zhang 0016, Tao Chen, Siyuan Chen, Lifei Wei, Jianting Ning. Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access control
9975 -- 9991Nasim Soltani, Amir Masoud Rahmani, Mahdi Bohlouli, Mehdi Hosseinzadeh 0001. Robust intrusion detection for network communication on the Internet of Things: a hybrid machine learning approach
9993 -- 10023Shivendu Mishra, Anurag Choubey, Sri Vaibhav Devarasetty, Nelson Sharma, Rajiv Misra. An innovative multi-head attention model with BiMGRU for real-time electric vehicle charging management through deep reinforcement learning
10025 -- 10051Ernest Ntizikira, Lei Wang 0005, Jenhui Chen, Xinxin Lu. Attention-based ResNet for intrusion detection and severity analysis using sliding window blockchain and firewall in IoT
10053 -- 10092Yunpeng Wang, Jixiang Zhang 0010, Mengjian Zhang, Deguang Wang, Ming Yang. Enhanced artificial ecosystem-based optimization for global optimization and constrained engineering problems
10093 -- 10123Bahman Arasteh, Keyvan Arasteh, Ali Ghaffari, Reza Ghanbarzadeh. A new binary chaos-based metaheuristic algorithm for software defect prediction
10125 -- 10139Jiaofen Nan, Siyuan Zhang, Duan Li 0004, Kaifan Zhang, Chuang Han, Yinghui Meng, Tanxin Zhu. Innovative combination of covariance analysis-based sliding time window and task-related component analysis for steady-state visual evoked potential recognition
10141 -- 10168Rui Zhong, Qinqin Fan, Chao Zhang, Jun Yu. Hybrid remora crayfish optimization for engineering and wireless sensor network coverage optimization
10169 -- 10196Prity Rani, Rohit Kumar Sachan, Sonal Kukreja. Educert-chain: a secure and notarized educational certificate authentication and verification system using permissioned blockchain
10197 -- 10234Nastaran Mehrabi Hashjin, Mohammad Hussein Amiri, Ardashir Mohammadzadeh, Seyedali Mirjalili, Nima Khodadadi. Novel hybrid classifier based on fuzzy type-III decision maker and ensemble deep learning model and improved chaos game optimization

Volume 27, Issue 6

7059 -- 7081Parijata Majumdar, Sanjoy Mitra. Blockchain technology for society 4.0: a comprehensive review of key applications, requirement analysis, research trends, challenges and future avenues
7083 -- 7110Aya H. Allam, Ibrahim Gomaa, Hala H. Zayed, Mohamed Taha. IoT-based eHealth using blockchain technology: a survey
7111 -- 7126Anil Elakas, Hasan Sözer, Ilgin Safak, Kübra Kalkan. A systematic mapping on software testing for blockchains
7127 -- 7145Kanishk Dwivedi, Majid Haghparast, Tommi Mikkonen. Quantum software engineering and quantum software development lifecycle: a survey
7147 -- 7198Hao Cui, Yaning Xiao, Abdelazim G. Hussien, Yanling Guo. Multi-strategy boosted Aquila optimizer for function optimization and engineering design problems
7199 -- 7217Wei Yang, Yao Shan, Jiaxuan Wang, Yu Yao. An industrial network intrusion detection algorithm based on IGWO-GRU
7219 -- 7240Yawar Abbas Bangash, Waseem Iqbal 0001, Shynar Mussiraliyeva, Saddaf Rubab, Bilal Rauf. Reliability through an optimal SDS controller's placement in a SDDC and smart city
7241 -- 7250Junnan Liu, Yongkang Ding, Yifan Liu. A balanced leader election algorithm based on replica distribution in Kubernetes cluster
7251 -- 7271Yongjun Xiao, Daria K. Voronkova. A new energy-aware technique to improve the network lifetime of wireless Internet of Things using a most valuable player algorithm
7273 -- 7306S. Krishnaveni, Thomas M. Chen, Mithileysh Sathiyanarayanan, B. Amutha. CyberDefender: an integrated intelligent defense framework for digital-twin-based industrial cyber-physical systems
7307 -- 7322Mouaad Mohy-Eddine, Azidine Guezzaz, Said Benkirane, Mourade Azrour. Malicious detection model with artificial neural network in IoT-based smart farming security
7323 -- 7349Keyvan Ahani, Sepideh Adabi, Parvaneh Asghari. A real-time stable competitive auction-based task offloading market for heterogeneous mobile cloud (HMC)
7351 -- 7372Hadeer S. Hossam, Hala Abdel-Galil, Mohamed Belal. An energy-aware module placement strategy in fog-based healthcare monitoring systems
7373 -- 7388Tarek Hagras, Gamal A. El-Sayed. Maintaining the completion-time mechanism for Greening tasks scheduling on DVFS-enabled computing platforms
7389 -- 7400Jatinder Kumar, Ashutosh Kumar Singh 0001. A secure paillier cryptosystem based privacy-preserving data aggregation and query processing models for smart grid
7401 -- 7415Chengang Dong, Yuhao Tang, Liyan Zhang. GHA-Inst: a real-time instance segmentation model utilizing YOLO detection framework
7417 -- 7438Antonio Nicolas-Plata, José Luis González Compeán, Víctor Jesús Sosa Sosa. A service mesh approach to integrate processing patterns into microservices applications
7439 -- 7454Yongxuan Sang, Jiangpo Wei, Zhifeng Zhang, Bo Wang 0018. A mobility-aware task scheduling by hybrid PSO and GA for mobile edge computing
7455 -- 7468Biroju Papachary, Rajeev Arya 0001, Bhasker Dappuri. Power-aware QoS-centric strategy for ultra reliable low latency communication in 5G beyond wireless networks
7469 -- 7491Alireza Froozani Fard, Mohammad Reza Mollahoseini Ardakani, Kamal Mirzaie. Multi-objective task offloading optimization in fog computing environment using INSCSA algorithm
7493 -- 7519Rasheed Ahmad, Izzat Alsmadi. Data fusion and network intrusion detection systems
7521 -- 7539Arash Heidari, Houshang Shishehlou, Mehdi Darbandi, Nima Jafari Navimipour, Senay Yalçin. A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree
7541 -- 7557Oussama Aiadi, Belal Khaldi, Aicha Korichi, Mourad Chaa, Mohamed Ben Bezziane, Ibrahim Omara. Fusion of deep and local gradient-based features for multimodal finger knuckle print identification
7559 -- 7580Davoud Mostafavi Amjad, Behdis Eslamnour. Locality-aware virtual machine placement based on similarity properties in mobile edge computing
7581 -- 7598Yu Peng, Jia Hao, Yang Chen, Jianhou Gan. Fine-grained resource adjustment of edge server in cloud-edge collaborative environment
7599 -- 7619Nguyen Tan Cam, Nguyen Ngoc Man. Uit-DGAdetector: detect domains generated by algorithms using machine learning
7621 -- 7636Nitin Thapliyal, Priti Dimri. Task scheduling using fuzzy logic with best-fit-decreasing for cloud computing environment
7637 -- 7655Mohammad Al-Khaddour, Majdeddin Ali, Mazen Yousef. Line-of-sight aware accurate collaborative localization based on joint TDoA and AoA measurements in UWB-MIMO environment
7657 -- 7671Xi-Wei Yang, Xiao-Chun Wu, Yue Shao, Gan Tang. Energy-delay-aware VNF scheduling: a reinforcement learning approach with hierarchical reward enhancement
7673 -- 7687Danyal Shahmirzadi, Navid Khaledian, Amir Masoud Rahmani. Analyzing the impact of various parameters on job scheduling in the Google cluster dataset
7689 -- 7704Meeniga Vijaya Lakshmi, Ambidi Naveena, Maddala Vijayalakshmi. An adaptive vulture based deep belief mechanism for searching user's resources in mobile P2P environment
7705 -- 7719Guokai Wu, Huabin Wang, Weiwei Lin 0001, Ruichao Mo, Xiaoxuan Luo. FS-DBoost: cross-server energy efficiency and performance prediction in cloud based on transfer regression
7721 -- 7740Mohammed M. Msallam, Syahril Anuar Bin Idris. Unsupervised text feature selection by binary fire hawk optimizer for text clustering
7741 -- 7756Dexin Zhu, Hu Zhou, Nianfeng Li, Lijun Song, Jun Zheng. Multi-factor authentication scheme based on custom attributes
7757 -- 7773Joaquín Entrialgo, Rafael Moreno-Vozmediano, José Luis Díaz. Cost and response time optimization of edge architectures
7775 -- 7802Essam H. Houssein, Mohammed R. Saad, Emre Çelik, Gang Hu, Abdelmgeid A. Ali, Hassan Shaban. An enhanced sea-horse optimizer for solving global problems and cluster head selection in wireless sensor networks
7803 -- 7823Junqi Chen, Sijie Yang, Yong Wang, Miao Ye, Fan Lei. Data repair accelerating scheme for erasure-coded storage system based on FPGA and hierarchical parallel decoding structure
7825 -- 7867Abdelaziz I. Hammouri, Malik Sh. Braik, Heba Al-Hiary, Rawan A. Abdeen. A binary hybrid sine cosine white shark optimizer for feature selection
7869 -- 7887Pooja Kumari, Ankit Kumar Jain. Timely detection of DDoS attacks in IoT with dimensionality reduction
7889 -- 7914Tao Hai, Arindam Sarkar, Muammer Aksoy, Rahul Karmakar, Sarbajit Manna, Amrita Prasad. Elevating security and disease forecasting in smart healthcare through artificial neural synchronized federated learning
7915 -- 7938Munish Saini, Eshan Sengupta, Suraaj Thakur. Artificial intelligence assisted IoT-fog based framework for emergency fire response in smart buildings
7939 -- 0Munish Saini, Eshan Sengupta, Suraaj Thakur. Correction: Artificial intelligence assisted IoT-fog based framework for emergency fire response in smart buildings
7941 -- 7954Jiao Han, Kang Jia. Entity relation joint extraction method for manufacturing industry knowledge data based on improved BERT algorithm
7955 -- 7979Divya Rani, Sachin Tripathi, Ashish Tomar. BSAS: blockchain-based shareable authentication scheme for smart healthcare
7981 -- 8000Hüseyin Bodur, Imad Fakhri Taha Al Yaseen. An Improved blockchain-based secure medical record sharing scheme
8001 -- 8013Alireza Souri, Sepehr Ebrahimi Mood, Mingliang Gao 0001, Kuan-Ching Li. Tournament based equilibrium optimization for minimizing energy consumption on dynamic task scheduling in cloud-edge computing
8015 -- 8030Ruchi Agrawal, Saurabh Singhal, Ashish Sharma 0003. Blockchain and fog computing model for secure data access control mechanisms for distributed data storage and authentication using hybrid encryption algorithm
8031 -- 8044Xikang Wang, Tongxi Wang, Hua Xiang. A multi-threaded particle swarm optimization-kmeans algorithm based on MapReduce
8045 -- 0Xikang Wang, Tongxi Wang, Hua Xiang. Correction: A multi-threaded particle swarm optimization-kmeans algorithm based on MapReduce
8047 -- 8064Reza Fallahi Kapourchali, Reza Mohammadi, Mohammad Nassiri. P4httpGuard: detection and prevention of slow-rate DDoS attacks using machine learning techniques in P4 switch
8065 -- 8097Adel Salah Ould Khaoua, Abdelmadjid Boukra, Fella Bey. On efficient interest forwarding in named data networks over IEEE 802.15.4: a comprehensive performance evaluation
8099 -- 8117Prarthana J. Mehta, Balu L. Parne, Sankita J. Patel. PF-AKA: PUF-FSM based Authentication and Key Agreement Framework for IoT based Smart Grid Networks
8119 -- 8139Youliang Cao, Shaopeng Guan, Debao Wang, Zhenqi Wang. BE-AC: reliable blockchain-based anti-counterfeiting traceability solution for pharmaceutical industry
8141 -- 8158Sunil Kumar Chowdhary, A. L. N. Rao. QoS and reliability aware matched bald eagle task scheduling framework based on IoT-cloud in educational applications
8159 -- 8172Deepika Gautam, Sunil Prajapat, Pankaj Kumar, Ashok Kumar Das, Korhan Cengiz, Willy Susilo. Blockchain-assisted post-quantum privacy-preserving public auditing scheme to secure multimedia data in cloud storage
8173 -- 8187Dani Mertens, Jeha Kim, Jingren Xu, Eunsam Kim, Choonhwa Lee. Smart flow: a provenance-supported smart contract workflow architecture
8189 -- 8206Archana Chhabra, Rahul Saha, Gulshan Kumar. PRIBANI: a privacy-ensured framework for blockchain transactions with information retrieval
8207 -- 8223Zhikuan Zhu, Hao Xu, Yingyu He, Zhuoyang Pan, Meiyu Zhang, Chengfeng Jian. A DRL-based online real-time task scheduling method with ISSA strategy
8225 -- 8241Abdenacer Naouri, Nabil Abdelkader Nouri, Amar Khelloufi, Abdelkarim Ben Sada, Huansheng Ning, Sahraoui Dhelim. Efficient fog node placement using nature-inspired metaheuristic for IoT applications
8243 -- 8268Arun Kumar Dey, Govind P. Gupta, Satya Prakash Sahu. BRL-ETDM: Bayesian reinforcement learning-based explainable threat detection model for industry 5.0 network
8269 -- 8287Alaa O. Khadidos, Hariprasath Manoharan, Shitharth Selvarajan, Adil Omar Khadidos, Abdulrhman M. Alshareef, Mohammed Altwijri. Distribution of resources beyond 5G networks with heterogeneous parallel processing and graph optimization algorithms
8289 -- 8306Anna-Valentini Michailidou, Christos Bellas, Anastasios Gounaris. Optimizing task allocation in multi-query edge analytics
8307 -- 8331Yuefeng Xu, Rui Zhong, Chao Zhang 0030, Jun Yu 0012. Multiplayer battle game-inspired optimizer for complex optimization problems
8333 -- 8348Ashish Kumar, Kakali Chatterjee. Securing internet of medical devices using energy efficient blockchain for healthcare 4.0
8349 -- 8366Xiaozong Wang, Fengqin Tang, Yuanyuan Wang, Cuixia Li, Xuejing Zhao. Community detection in attributed networks using neighborhood information
8367 -- 8392Ahsan Nazir, Jingsha He, Nafei Zhu, Muhammad Shahid Anwar, Muhammad Salman Pathan. Enhancing IoT security: a collaborative framework integrating federated learning, dense neural networks, and blockchain
8393 -- 8411Hongbo Zhang, Xiwen Qin, Xueliang Gao. Probe mechanism based particle swarm optimization for feature selection
8413 -- 8458Reyhane Ghafari, Najme Mansouri. A novel energy-based task scheduling in fog computing environment: an improved artificial rabbits optimization approach
8459 -- 8475Yuanchun Lan, Jiahao Ling, Xiaohui Huang, Junyang Wang 0003, Zhuyi Hu, Liyan Xiong. A local global attention based spatiotemporal network for traffic flow forecasting
8477 -- 8492He Lu, Yanan Zhao, Yajing Song, Yang Yang, Guanjie He, Haiyang Yu, Yilong Ren. A transfer learning-based intrusion detection system for zero-day attack in communication-based train control system
8493 -- 8530Ruiqi Song, Weike Nie, Aiqin Hou, Suqin Xue. Dynamic random mutation hybrid Harris hawk optimization and its application to training kernel extreme learning machine
8531 -- 8555Yuan Zhao 0003, Hongmin Gao, Shuangshuang Yuan, Yan Li. A task offloading strategy considering forwarding errors based on cloud-fog collaboration
8557 -- 8575Veeramani Shanmugam, Huo-Chong Ling, Lenin Gopal, Sivaraman Eswaran, Choo W. R. Chiong. Network-aware virtual machine placement using enriched butterfly optimisation algorithm in cloud computing paradigm
8577 -- 8594Santosh Shakya, Priyanka Tripathi. A background-based new scheduling approach for scheduling the IoT network task with data storage in cloud environment
8595 -- 8619Yunsheng Tian, Dan Zhang, Hongbo Zhang, Juan Zhu, Xiaofeng Yue. An improved cuckoo search algorithm for global optimization
8621 -- 8635Chanki Kim, Kang-Wook Chon. Accelerating erasure coding by exploiting multiple repair paths in distributed storage systems
8637 -- 0Chanki Kim, Kang-Wook Chon. Correction: Accelerating erasure coding by exploiting multiple repair paths in distributed storage systems

Volume 27, Issue 5

5489 -- 5515Zahra Shojaee Rad, Mostafa Ghobaei Arani, Reza Ahsan. Memory orchestration mechanisms in serverless computing: a taxonomy, review and future directions
5517 -- 5545Ajay Nain, Sophiya Sheikh, Mohammad Shahid, Rohit Malik. Resource optimization in edge and SDN-based edge computing: a comprehensive study
5547 -- 5570Iqra Sadia Rao, Miss Laiha Mat Kiah, M. Muzaffar Hameed, Zain Anwer Memon. Scalability of blockchain: a comprehensive review and future research direction
5571 -- 5610Mohsen Ghorbian, Mostafa Ghobaei Arani, Leila Esmaeili. A survey on the scheduling mechanisms in serverless computing: a taxonomy, challenges, and trends
5611 -- 5630Ankush Manocha, Sandeep Kumar Sood, Munish Bhatia. Edge intelligence-assisted smart healthcare solution for health pandemic: a federated environment approach
5647 -- 5661Marzieh Ranjbar Pirbasti, Olivia Das. Ovcosim: an open-source versatile computation offloading simulator for cloud and fog computing
5663 -- 5675Jing Song, Jinyong Chang. General construction of compressive integrity auditing protocol from strong homomorphic encryption scheme
5677 -- 5698Nafei Zhu, Yue Yang, Weidong Du, Yu Gan, Jingsha He. Toward designing highly effective and efficient consensus mechanisms for blockchain-based applications
5699 -- 5719Sheetal Garg, Rohit Ahuja, Raman Singh, Ivan Perl. An effective deep learning architecture leveraging BIRCH clustering for resource usage prediction of heterogeneous machines in cloud data center
5721 -- 5739Vaibhav Tiwari, Chandrasen Pandey, Diptendu Sinha Roy. A forecasting-based approach for optimal deployment of edge servers in 5G networks
5741 -- 5754Rachid EL Mokadem, Yann Ben Maissa, Zineb El Akkaoui. eXtreme Federated Learning (XFL): a layer-wise approach
5755 -- 5782Gunaganti Sravanthi, Nageswara Rao Moparthi. An efficient IoT based crop disease prediction and crop recommendation for precision agriculture
5799 -- 5814Jamil Al-Sawwa, Mohammad Almseidin, Mouhammd Alkasassbeh 0001, Khalid Alemerien, Remah Younisse. Spark-based multi-verse optimizer as wrapper features selection algorithm for phishing attack challenge
5867 -- 5877Lhoussaine Daoudi, Mohamed Baslam, Mohamed Zagour, Saïd Safi. 5 G and beyond wireless network optimization through RIS technology: a pricing game
5913 -- 5931NarasimhaSwamy Biyyapu, Esther Jyothi Veerapaneni, Phani Praveen Surapaneni, Sai Srinivas Vellela, Ramesh Vatambeti. Designing a modified feature aggregation model with hybrid sampling techniques for network intrusion detection
5953 -- 5979Shahnawaz Ahmad, Shabana Mehfuz, Shabana Urooj, Najah Alsubaie. Machine learning-based intelligent security framework for secure cloud key management
5995 -- 6012Nilesh J. Uke, Sharayu A. Lokhande, Preeti Kale, Shilpa Devram Pawar, Aparna A. Junnarkar, Sulbha Yadav, Swapna Bhavsar, Hemant B. Mahajan. Distributed privacy preservation for online social network using flexible clustering and whale optimization algorithm
6013 -- 6038Sujoy Roy, Jeet Agrawal, Alok Kumar, Udai Pratap Rao. Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing
6059 -- 6079Francisco Airton Silva, Iure Fé, Francisco Silva, Tuan Anh Nguyen 0002. Quantifying the impact of resource redundancy on smart city system dependability: a model-driven approach
6167 -- 6184Kishu Gupta, Deepika Saxena, Rishabh Gupta, Ashutosh Kumar Singh 0001. MAIDS: malicious agent identification-based data security model for cloud environments
6185 -- 6204Minzhi Xu, Weidong Li 0002, Xuejie Zhang 0002, Qian Su. A discrete dwarf mongoose optimization algorithm to solve task assignment problems on smart farms
6205 -- 6221Vijay Kumar Yadav 0004, Pushpa, Khushi Dabas, Shobhita Khatri, Vanshika Sehrawat. Circulation of legitimate information over VANETs using threshold signature scheme
6247 -- 6264Bing Tang, Yuqiang Xiao, Li Zhang 0096, Buqing Cao, Mingdong Tang, Qing Yang. AFL-HCS: asynchronous federated learning based on heterogeneous edge client selection
6265 -- 6288Ramandeep Sandhu, Mohammad Faiz, Harpreet Kaur, Ashish Srivastava, Vipul Narayan. Enhancement in performance of cloud computing task scheduling using optimization strategies
6323 -- 6340Kyle Klenk, Raymond J. Spiteri. Improving resource utilization and fault tolerance in large simulations via actors
6355 -- 6375Mahmoud Darwich, Magdy A. Bayoumi. Video quality adaptation using CNN and RNN models for cost-effective and scalable video streaming Services
6377 -- 6395Anil Kumar Yamarthy, Ch. Koteswara Rao. MDepthNet based phishing attack detection using integrated deep learning methodologies for cyber security enhancement
6397 -- 6424Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil. SDDA-IoT: storm-based distributed detection approach for IoT network traffic-based DDoS attacks
6425 -- 6440Chang Zhang, Tao Zhu 0001, Hangxing Wu, Huansheng Ning. PerMl-Fed: enabling personalized multi-level federated learning within heterogenous IoT environments for activity recognition
6441 -- 6469Mengjian Zhang, Guihua Wen. Duck swarm algorithm: theory, numerical optimization, and applications
6489 -- 0Behzad Saemi, Fatemeh Halataei, Rouhollah Ahmadi, Ali A. R. Hosseinabadi, Seyed Saeid Mirkamali, Ali Asghar Rahmani Hosseinabadi. S by balancing the load on road side units
6591 -- 6608Liyan Xiong, Yijuan Zeng, Xiaohui Huang 0003, Zhida Li, Peng Huang. MLANet: multi-level attention network with multi-scale feature fusion for crowd counting
6609 -- 6622Gyanapriya Pradhan, Madhukrishna Priyadarsini. A trusted computing framework for cloud data security using role-based access and pattern recognition
6667 -- 6688Ankita Choudhary, Meenu Chawla, Namita Tiwari. A blockchain-based framework for Academic Bank of Credit with transparent credit mobility
6703 -- 6772Shivankur Thapliyal, Narender Kumar. Hyperbolic Sine Optimizer: a new metaheuristic algorithm for high performance computing to address computationally intensive tasks
6787 -- 6804Zihan Chen, Haijiang Zhu, Yutong Liu, Xiaoyu Gao. MSCA-UNet: multi-scale channel attention-based UNet for segmentation of medical ultrasound images
6823 -- 6841Faten Louati, Farah Barika Ktata, Ikram Amous. Big-IDS: a decentralized multi agent reinforcement learning approach for distributed intrusion detection in big data networks
6843 -- 6868Reyhaneh Ameri, Mohammad Reza Meybodi. An improved cellular goore game-based consensus protocol for blockchain
6889 -- 6929Vidyapati Jha, Priyanka Tripathi. Decentralized multiple hypothesis testing in Cognitive IOT using massive heterogeneous data
6931 -- 6951Mohammed W. Elbes, Shadi AlZu'bi, Tarek Kanan, Ala Mughaid, Samia A. Abu-Shanab. Big dermatological data service for precise and immediate diagnosis by utilizing pre-trained learning models
6985 -- 7006Anjali Choudhary, Ranjit Rajak. A novel strategy for deterministic workflow scheduling with load balancing using modified min-min heuristic in cloud computing environment
7007 -- 7022Chang Xu 0004, Hongzhou Rao, Liehuang Zhu, Chuan Zhang 0003, Kashif Sharif. EPVM: efficient and publicly verifiable computation for matrix multiplication with privacy preservation
7023 -- 7048Sumit, Rajender Singh Chhillar, Sandeep Dalal, Surjeet Dalal, Umesh Kumar Lilhore, Sarita Samiya. A dynamic and optimized routing approach for VANET communication in smart cities to secure intelligent transportation system via a chaotic multi-verse optimization algorithm

Volume 27, Issue 4

3911 -- 3925Brandon A. Mosqueda González, Omar Hasan, Wisnu Uriawan, Youakim Badr, Lionel Brunie. Secure and efficient decentralized machine learning through group-based model aggregation
3927 -- 3944Jongho Seol, Zuqiang Ke, Abhilash Kancharla, Shital Joshi, Nohpill Park. A non-fungible token (NFT) chain model and performance study
3945 -- 3956Shengwei You, Kristina Radivojevic, Jarek Nabrzyski, Paul R. Brenner. Persona preserving reputation protocol (P2RP) for enhanced security, privacy, and trust in blockchain oracles
3957 -- 3981Wenxiang Wei, Nafei Zhu, Jian Wang, Hongyu Song, Jingsha He. A scalable blockchain storage scheme for VANET
3983 -- 3996Si Yuan Jin, Yong Xia, Bo Tong Xu. Scalability meets regulation: UTXO-based sharding and zero-knowledge proofs for regulated digital currencies
3997 -- 4014Youssif Abuzied, Mohamed Ghanem, Fadi Dawoud, Habiba Gamal, Eslam Soliman, Hossam Sharara, Tamer A. ElBatt. A privacy-preserving federated learning framework for blockchain networks
4015 -- 4034Md. Jobair Hossain Faruk, Fazlul Alam, Mazharul Islam, Akond Rahman. Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparency
4035 -- 4061Sebastian Kotstein, Christian Decker 0003. RESTBERTa: a Transformer-based question answering approach for semantic search in Web API documentation
4063 -- 4076Aditi Gupta, Sukanya Gupta, Adeiza James Onumanyi, Satyadev Ahlawat, Yamuna Prasad, Virendra Singh. A-TSPD: autonomous-two stage algorithm for robust peak detection in online time series
4077 -- 4093Robin Lichtenthäler, Guido Wirtz. Formulating a quality model for cloud-native software architectures: conceptual and methodological considerations
4095 -- 4125Yashwant Singh Patel, Paul Townend, Anil Singh, Per-Olov Östberg. Modeling the Green Cloud Continuum: integrating energy considerations into Cloud-Edge models
4127 -- 4144Nithya Chidambaram, Karuppusamy Thenmozhi, Pethuru Raj 0001, Rengarajan Amirtharajan. DNA-chaos governed cryptosystem for cloud-based medical image repository
4145 -- 4170Tomás Cerný, Amr S. Abdelfattah, Jorge Yero, Davide Taibi 0001. From static code analysis to visual models of microservice architecture
4171 -- 4185Md Showkat Hossain Chy, Korn Sooksatra, Jorge Yero, Tomás Cerný. Benchmarking Micro2Micro transformation: an approach with GNN and VAE
4187 -- 4206Ako Muhammad Abdullah. Energy-efficient aware and predicting bandwidth estimation routing protocol for hybrid communication in wireless body area networks
4207 -- 4221Rekha, Ritu Garg. K-LionER: meta-heuristic approach for energy efficient cluster based routing for WSN-assisted IoT networks
4223 -- 4253Tarik Zakaria Benmerar, Theodoros Theodoropoulos, Diogo Fevereiro, Luís Rosa 0001, João Rodrigues, Tarik Taleb, Paolo Barone, Giovanni Giuliani, Konstantinos Tserpes, Luís Cordeiro. Towards establishing intelligent multi-domain edge orchestration for highly distributed immersive services: a virtual touring use case
4255 -- 4279Thiago Pereira da Silva, Thaís Vasconcelos Batista, Flávia Coimbra Delicato, Paulo de Figueiredo Pires. An online ensemble method for auto-scaling NFV-based applications in the edge
4281 -- 4320Zari Shamsa, Ali Rezaee, Sahar Adabi, Ali Movaghar-Rahimabadi, Amir Masoud Rahmani. A distributed load balancing method for IoT/Fog/Cloud environments with volatile resource support
4321 -- 4346Durgabati Podder, Subhrajyoti Deb, Debapriya Banik, Nirmalya Kar, Aditya Kumar Sahu. Robust medical and color image cryptosystem using array index and chaotic S-box
4347 -- 4360Hesham AlMansouri, Zaid Hussain. Shortest node-to-node disjoint paths algorithm for symmetric networks
4361 -- 4384Lisheng Sun, Yongjie Ma, Yuhua Pan, Minghao Wang. Refining differential evolution with mutation rate and neighborhood weight local search
4385 -- 4413Komeil Moghaddasi, Mohammad Masdari. Blockchain-driven optimization of IoT in mobile edge computing environment with deep reinforcement learning and multi-criteria decision-making techniques
4415 -- 4448Liang Zeng, Junyang Shi, Ming Li, Shanshan Wang. Sine Cosine Embedded Squirrel Search Algorithm for Global Optimization and Engineering Design
4449 -- 4468Ali Seyfollahi, Md Mainuddin, Tania Taami, Ali Ghaffari. RM-RPL: reliable mobility management framework for RPL-based IoT systems
4469 -- 4490M. I. Thariq Hussan, G. Vinoda Reddy, P. T. Anitha, A. Kanagaraj, P. Naresh. DDoS attack detection in IoT environment using optimized Elman recurrent neural networks based on chaotic bacterial colony optimization
4491 -- 4514Javad Dogani, Ali Yazdanpanah, Arash Zare, Farshad Khunjush. A two-tier multi-objective service placement in container-based fog-cloud computing platforms
4515 -- 4536Mohammad Hadian, Seyed Hossein Erfani, Mahmood Deypir, Meghdad Mirabi. CD-TMS: a combinatorial design-based token management system to enhance security and performance in blockchain
4537 -- 4550Marzieh Sadat Zahedinia, Mohammad-Reza Khayyambashi, Ali Bohlooli. IoT data management for caching performance improvement in NDN
4551 -- 4568Saleh Atiewi, Amer Al-Rahayfeh, Muder Almiani, Abdullah Abuhussein, Salman Yussof. Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
4569 -- 4588Birglang Bargayary, Nabajyoti Medhi. Preserving flow table integrity in OpenFlow networks through smart contract
4589 -- 4603Nidhi Kumari, Prasanta K. Jana. A metaheuristic-based task offloading scheme with a trade-off between delay and resource utilization in IoT platform
4605 -- 4619Zhengfeng Li, Changchun Zhao, Guohui Zhang, Donglin Zhu, Lujun Cui. Multi-strategy improved sparrow search algorithm for job shop scheduling problem
4621 -- 4633Mohammed Maray, Sahibzada Muhammad Rizwan, Ehzaz Mustafa, Junaid Shuja. Microservices enabled bidirectional fault-tolerance scheme for healthcare internet of things
4635 -- 4657Husni Abed, Omar Al-Zoubi, Hashem Alayan, Mohammad Alshboul. Towards maintaining confidentiality and anonymity in secure blockchain-based e-voting
4659 -- 4672Sahul Goyal, Lalit Kumar Awasthi. An energy-efficient black widow-based adaptive VM placement approach for cloud computing
4673 -- 4685Smruti Rekha Swain, Anshu Parashar, Ashutosh Kumar Singh 0001, Chung-Nan Lee. Efficient straggler task management in cloud environment using stochastic gradient descent with momentum learning-driven neural networks
4687 -- 4703José Manuel Ruiz Ródenas, Javier Pastor-Galindo, Félix Gómez Mármol. A general and modular framework for dark web analysis
4705 -- 4723Laya Mohammadi, Vahid Khajehvand. Energy consumption optimization through an intelligent task offloading prediction mechanism in vehicular fog networks
4725 -- 4739Partha Sarathi Chakraborty 0001, Omkar Santosh Gavhane, Somanath Tripathy. SEVCOD: secure and efficient verifiable computation on outsourced data
4741 -- 4755Xiaoyan Zhao, Conghui Zhang, Shaopeng Guan. A data lake-based security transmission and storage scheme for streaming big data
4757 -- 4777Changyu Duan, Rong Jiang, Yi Zhang, Bin Wu, Fengliang Li, Yu Duan. Distributed medical data storage model based on blockchain technology
4779 -- 4803Mustafa Daraghmeh, Anjali Agarwal, Yaser Jararweh. An ensemble clustering approach for modeling hidden categorization perspectives for cloud workloads
4805 -- 4821Jiechao Liang, Weiwei Lin, Yangguang Xu, Yubin Liu, Ruichao Mo, Xiaoxuan Luo. Energy-aware parameter tuning for mixed workloads in cloud server
4823 -- 4839Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti. Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities
4841 -- 4853Yuchen Zhang, Xiao Zhang, Yulong Shi, Zhijie Huang. Sg: Automated tuning algorithm for storage systems based on simulated environments and group climbing
4855 -- 4865Jie Luo, Zhengshuai Yin, Linqiu Gui. A GNSS UWB tight coupling and IMU ESKF algorithm for indoor and outdoor mixed scenario
4867 -- 4881Uddeshaya Kumar, Manish Garg, Gautam Kaushik. Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication
4883 -- 4908Taha Abdelazziz Rahmani, Ghalem Belalem, Sidi Ahmed Mahmoudi, Omar Rafik Merad Boudia. Machine learning-driven energy-efficient load balancing for real-time heterogeneous systems
4909 -- 4923Mohammad Osmanpoor, Alireza Shameli Sendi, Fateme Faraji Daneshgar. Convergence of the Harris hawks optimization algorithm and fuzzy system for cloud-based task scheduling enhancement
4925 -- 4940Sanjay Roka, Manoj Diwakar. DSLSTM: a deep convolutional encoder-decoder architecture for abnormality detection in video surveillance
4941 -- 4961Walid K. Ghamry, Suzan Shukry. Multi-objective intelligent clustering routing schema for internet of things enabled wireless sensor networks using deep reinforcement learning
4963 -- 4982Gurjot Singh, Prajit Sengupta, Anant Mehta, Jatin Bedi. A feature extraction and time warping based neural expansion architecture for cloud resource usage forecasting
4983 -- 5004Zeyneb Chafai, Hassina Nacer, Ouiza Lekadir, Nawel Gharbi, Linda Ouchaou. A performance evaluation model for users' satisfaction in federated clouds
5005 -- 5019D. Adhimuga Sivasakthi, A. Sathiyaraj, Ramkumar Devendiran. HybridRobustNet: enhancing detection of hybrid attacks in IoT networks through advanced learning approach
5021 -- 5045Bo Zhang, Yanyan Xu 0003, Yuejing Yan, Zhiheng Wang. Privacy-preserving image retrieval based on additive secret sharing in cloud environment
5047 -- 5073Bilal Abu Salih, Salihah Alotaibi, Ruba Abukhurma, Muder Almiani, Mohammed Aljaafari. DAO-LGBM: dual annealing optimization with light gradient boosting machine for advocates prediction in online customer engagement
5075 -- 5091Nidhi, Jyoti Grover. Federated learning analysis for vehicular traffic flow prediction: evaluation of learning algorithms and aggregation approaches
5093 -- 5105Jung-Woong Sung, Seung-Jae Han. Use of edge resources for DNN model maintenance in 5G IoT networks
5107 -- 5119Yassin Farhat, Asma Atig, Ali Zribi, Ridha Ben Abdennour. Neural emulator for nonlinear systems based on PSO algorithm: real-time validation
5121 -- 5141Mohammad Mohammadi, Amin Mehranzadeh, Mohsen Chekin. F-EVM: improving routing in Internet of Things using fuzzy MAIRCA approach and fuzzy eigenvector method
5143 -- 5163Mehrin Rouhifar, Alireza Hedayati 0001, Vahe Aghazarian. DITRA: an efficient event-driven multi-objective optimization algorithm for bandwidth allocation in IoT environments
5165 -- 5193Mehdi Seydali, Farshad Khunjush, Javad Dogani. Streaming traffic classification: a hybrid deep learning and big data approach
5195 -- 5215Numan Shafi, Muhammad Abdullah 0004, Waheed Iqbal, Abdelkarim Erradi, Faisal Bukhari. Cdascaler: a cost-effective dynamic autoscaling approach for containerized microservices
5217 -- 5233Vijaita Kashyap, Rakesh Ahuja, Ashok Kumar 0003. A hybrid approach for fault-tolerance aware load balancing in fog computing
5235 -- 5283Benyamin Abdollahzadeh, Nima Khodadadi, Saeid Barshandeh, Pavel Trojovský, Farhad Soleimanian Gharehchopogh, El-Sayed M. El-Kenawy, Laith Abualigah, Seyedali Mirjalili. Puma optimizer (PO): a novel metaheuristic optimization algorithm and its application in machine learning
5285 -- 5294Masoum Farahmandian, Mehdi Farrokhbakht Foumani, Peyman Bayat. Improving fault tolerance in LinuX container-based distributed systems using blockchain
5295 -- 5336Anurag Choubey, Abhishek Sikarwar, Shreya Asoba, Rajiv Misra. Towards an IPFS-based highly scalable blockchain for PEV charging and achieve near super-stability in a V2V environment
5337 -- 5354Slokashree Padhi, R. B. V. Subramanyam. Uncertainty Level-Based Algorithms by Managing Renewable Energy for Geo-Distributed Datacenters
5355 -- 5376Muhammad Hussain, Nadeem Iqbal 0001, Zia Bashir. Image pixels swapping encryption based on the TetraVex game and a publicly hash-sharing algorithm
5377 -- 5401Havva Gülay Gürbüz, Bedir Tekinerdogan, Cagatay Catal, Nagehan Pala Er. Test suite assessment of safety-critical systems using safety tactics and fault-based mutation testing
5403 -- 5421Akashdeep Kaur, Sharad Saxena, Rajesh Kumar 0013. OsCoMIT: Osmotic computing-based service management for intelligent transportation systems in 5G network
5423 -- 5458Jiawen Deng, Jihui Zhang, Shengxiang Yang. Optimizing electric vehicle routing with nonlinear charging and time windows using improved differential evolution algorithm
5459 -- 5471Manikandan Nanjappan, Pradeep Krishnadoss, Gobalakrishnan Natesan, A. Samydurai, G. Premalatha. DeepLG SecNet: utilizing deep LSTM and GRU with secure network for enhanced intrusion detection in IoT environments
5473 -- 5488Helen D. Karatza, Georgios L. Stavrinides. Resource allocation and aging priority-based scheduling of linear workflow applications with transient failures and selective imprecise computations

Volume 27, Issue 3

2313 -- 2327Yizhuo Yang, Hongjin Zeng, Tingping Chen, Meng Lv. Design of a distributed offloading and real-time data unified access platform for IoT within command and control communication networks
2329 -- 2344Shilong Zhao, Gang Li, Mingle Zhou, Min Li. YOLO-CEA: a real-time industrial defect detection method based on contextual enhancement and attention
2345 -- 2363Mohit, Sanmeet Kaur, Maninder Singh. Design and implementation of blockchain-based supply chain framework with improved traceability, privacy, and ownership
2365 -- 2379Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, Hung Tran. Machine learning-based intrusion detection: feature selection versus feature extraction
2381 -- 2398Damon Alsup, Mohan Putluru, Suxia Cui, Yunpeng Zhang. Cloud security game theory scoring from predation models in simulation
2399 -- 2426Olesia Pozdniakova, Aurimas Cholomskis, Dalius Mazeika. Self-adaptive autoscaling algorithm for SLA-sensitive applications running on the Kubernetes clusters
2427 -- 2445Lamis Abdo, Imtiaz Ahmad, Sa'ed Abed. A smart admission control and cache replacement approach in content delivery networks
2447 -- 2464Ali Siddique, Mang I Vai, Sio-Hang Pun. A low-cost, high-throughput neuromorphic computer for online SNN learning
2465 -- 2488Bahman Varastan, Shahram Jamali, Reza Fotohi. Hardening of the Internet of Things by using an intrusion detection system based on deep learning
2489 -- 2504Hani Al-Balasmeh, Maninder Singh, Raman Singh. Hilbert curves-based location privacy technique for vehicular cloud networks
2505 -- 2523Chaira Mahmoud, Sofiane Aouag, Hadda Cherroun, Bouziane Brik, Abdelmounaam Rezgui. A decentralized blockchain-based authentication scheme for cross-communication in IoT networks
2525 -- 2548Arslan Nedhir Malti, Mourad Hakem, Badr Benmammar. A new hybrid multi-objective optimization algorithm for task scheduling in cloud systems
2549 -- 2569Jyothish A., Ashik Mathew, P. Vinod 0001. Effectiveness of machine learning based android malware detectors against adversarial attacks
2571 -- 2591Shuai Chang, Chunlin Li 0001, ChunPing Deng, Youlong Luo. Low-latency controller load balancing strategy and offloading decision generation algorithm based on lyapunov optimization in SDN mobile edge computing environment
2593 -- 2609Deepika Kumari, Pankaj Kumar, Sunil Prajapat. A blockchain assisted public auditing scheme for cloud-based digital twin healthcare services
2611 -- 2634Animesh Kuity, Sateesh Kumar Peddoju. pHPCe: a hybrid power conservation approach for containerized HPC environment
2635 -- 2651Amer Al-Rahayfeh, Saleh Atiewi, Muder Almiani, Mohammad Jararweh, Miad Faezipour. Utilizing 3D magnetic source imaging with landmark-based features and multi-classification for Alzheimer's Disease diagnosis
2653 -- 2671Shaoyong Li, Xueshu Hong, Yao Feng. MuChat against active attacks, passive attacks, and traffic analysis methods: a free convert chat application for instant communication on mobile
2673 -- 2690Amir Vafid Hanafi, Ali Ghaffari, Hesam Rezaei, Aida Valipour, Bahman Arasteh. Intrusion detection in internet of things using improved binary golden jackal optimization algorithm and LSTM
2691 -- 2713Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti, Reji Thomas, Tai-Hoon Kim. RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things
2715 -- 2740Reyhaneh Ameri, Mohammad Reza Meybodi. The cellular goore game-based consensus protocol: a cognitive model for blockchain consensus
2741 -- 2759Bing Tang, Huiyuan Han, Qing Yang, Wei Xu. Operator placement for data stream processing based on publisher/subscriber in hybrid cloud-fog-edge infrastructure
2761 -- 2773Yihong Liu, Xuchang Liu, Bo Zhang. RetinaNet-vline: a flexible small target detection algorithm for efficient aggregation of information
2775 -- 2784Xiao Zhang. Mixtran: an efficient and fair scheduler for mixed deep learning workloads in heterogeneous GPU environments
2785 -- 2803Hemant Mahajan, K. T. V. Reddy. Secure gene profile data processing using lightweight cryptography and blockchain
2805 -- 2827Ankita Srivastava, Narander Kumar. An efficient firefly and honeybee based load balancing mechanism in cloud infrastructure
2829 -- 2843Biroju Papachary, Rajeev Arya 0001, Bhasker Dappuri. Efficient resource allocation with dynamic traffic arrivals on D2D communication for beyond 5G networks
2845 -- 2874Hajer Nabli, Raoudha Ben Djemaa, Ikram Amous Ben Amor. Improved clustering-based hybrid recommendation system to offer personalized cloud services
2875 -- 0Hajer Nabli, Raoudha Ben Djemaa, Ikram Amous Ben Amor. Correction: Improved clustering-based hybrid recommendation system to offer personalized cloud services
2877 -- 2900Kariyappa Janani, Sriramulu Ramamoorthy. A security framework to enhance IoT device identity and data access through blockchain consensus model
2901 -- 2915Zhanyou Ma, Miao Yan, Rong Wang, Shunzhi Wang. Performance analysis of P2p network content delivery based on queueing model
2917 -- 2929Thanasis Moustakas, Kostas Kolomvatsos. Cluster based similarity extraction upon distributed datasets
2931 -- 2946Yi Wan. The balance of utility, privacy, and trust in network services
2947 -- 2958M. Gayathri Santhosh, T. R. Reshmi. A novel revocation management for distributed environment: a detailed study
2959 -- 2970Gongbo Liang, Mohammad Salem Atoum, Xin-xing, Izzat Alsmadi. Benchmark assessment for the DeepSpeed acceleration library on image classification
2971 -- 2982Abdelaziz Mokhnache, Lahcene Ziet, Fayçal Radjah. Comparative analysis between a pixel-wise image encryption scheme and AES in a web application context
2983 -- 2998K. T. Jafseer, S. Shailesh, A. Sreekumar. CPOCEDS-concept preserving online clustering for evolving data streams
2999 -- 3016D. Balakrishnan, T. Dhiliphan Rajkumar, S. Dhanasekaran, B. S. Murugan. Secure and energy-efficient data transmission framework for IoT-based healthcare applications using EMCQLR and EKECC
3017 -- 3035Ning Xie, Jixian Zhang, Xuejie Zhang 0002, Weidong Li. Double auction mechanisms in edge computing resource allocation for blockchain networks
3037 -- 3054Dexin Zhu, Yu Sun, Nianfeng Li, Lijun Song, Jun Zheng. Secure electronic medical records sharing scheme based on blockchain and quantum key
3055 -- 3073Rami Al-Jarrah, Hitham Tlilan, Abdallah Khreishah. Exploiting the adaptive neural fuzzy inference system for predicting the effect of notch depth on elastic new strain-concentration factor under combined loading
3075 -- 3098Chen Xiaolong, Du Yu. Hybrid artificial immune algorithm for energy-efficient distributed flexible job shop in semiconductor manufacturing
3099 -- 3111Ahmet Vedat Tokmak, Akhan Akbulut, Cagatay Catal. Boosting the visibility of services in microservice architecture
3113 -- 3133Qihuan Wu, Xiaoming You, Sheng Liu. Multi-ant colony optimization algorithm based on game strategy and hierarchical temporal memory model
3135 -- 3148Prabhjot Kaur, Nitin Kumar 0001. BRIEFBCS: binary robust independent elementary features based fuzzy vault scheme in BCS
3149 -- 3162Yuchen Zhang, Xiao Zhang, Jinyang Yu, Yulong Shi, Linxuan Su. Quantification and analysis of performance fluctuation in distributed file system
3163 -- 3177Mahmoud Darwich, Taghreed Alghamdi, Kasem Khalil, Yasser Ismail, Magdy A. Bayoumi. Cost-optimized cloud resource management for video streaming: ARIMA predictive approach
3179 -- 3201Neha Gahlan, Divyashikha Sethia. Federated learning inspired privacy sensitive emotion recognition based on multi-modal physiological sensors
3203 -- 3218Attia Qammar, Abdenacer Naouri, Jianguo Ding, Huansheng Ning. Blockchain-based optimized edge node selection and privacy preserved framework for federated learning
3219 -- 3231Ju-Won Park, Xin Huang, Jae Kook Lee, Taeyoung Hong. I/O-signature-based feature analysis and classification of high-performance computing applications
3233 -- 3257Jeong-Hoon Kim, Sun-Hyun Kim, Charn-Doh Bak, Seung-Jae Han. Adaptive cloud resource allocation for large-scale crowdsourced multimedia live streaming services
3259 -- 3275Abdullah Alsalemi, Abbes Amira, Hossein Malekmohamadi, Kegong Diao. Energy data classification at the edge: a comparative studyfor energy efficiency applications
3277 -- 3291Liyan Xiong, Zhuyi Hu, Xinhua Yuan, Weihua Ding, Xiaohui Huang, Yuanchun Lan. Multi-scale attention graph convolutional recurrent network for traffic forecasting
3293 -- 3305YuPing Yan, Yutian Hong. Design of the implementation information management platform for distributed generation in distribution network based on information integration
3307 -- 3322Rami Mohawesh, Muna Al-Hawawreh, Sumbal Maqsood, Omar AlQudah. Factitious or fact? Learning textual representations for fake online review detection
3323 -- 3339Hui Xiang, Meiyu Zhang, Chengfeng Jian. Federated deep reinforcement learning-based online task offloading and resource allocation in harsh mobile edge computing environment
3341 -- 3362Zeynep Garip, Ekin Ekinci, Murat Erhan Çimen. A comparative study of optimization algorithms for feature selection on ML-based classification of agricultural data
3363 -- 3378Sana Aurangzeb, Muhammad Aleem, Muhammad Taimoor Khan 0001, Haris Anwar, Muhammad Shaoor Siddique. Cybersecurity for autonomous vehicles against malware attacks in smart-cities
3379 -- 3395Olfa Souki, Raoudha Ben Djemaa, Ikram Amous, Florence Sèdes. Monitoring and analyzing as a service (MAaaS) through cloud edge based on intelligent transportation applications
3397 -- 3416Ruiwen Wang, Jihong Liu, Qiang Zhang, Chao Fu, Yongzhu Hou. Federated learning for feature-fusion based requirement classification
3417 -- 3432Shruti Arora, Rinkle Rani, Nitin Saxena 0002. SETL: a transfer learning based dynamic ensemble classifier for concept drift detection in streaming data
3433 -- 3449Alberto Cabrera, Francisco Almeida, Dagoberto Castellanos Nieves, Ariel Oleksiak, Vicente Blanco Pérez. Energy efficient power cap configurations through Pareto front analysis and machine learning categorization
3451 -- 3469Eduru Harindra Venkatesh, Yelleti Vivek, Vadlamani Ravi, Shiva Shankar Orsu. Parallel and streaming wavelet neural networks for classification and regression under apache spark
3471 -- 3479Anirudh Kasturi, Akshat Agrawal, Chittaranjan Hota. Secure peer-to-peer learning using feature embeddings
3481 -- 3498Tao Shen 0004, Qianqi Sun, Chi Zhang, Fenhua Bai. SEKad: a scalable protocol for blockchain networks with enhanced broadcast efficiency
3499 -- 3519Guilherme Andrade, Willian Barreiros, Leonardo Rocha 0001, Renato Ferreira, George Teodoro. Large-scale response-aware online ANN search in dynamic datasets
3521 -- 3535Sara Amaouche, Azidine Guezzaz, Said Benkirane, Mourade Azrour. IDS-XGbFS: a smart intrusion detection system using XGboostwith recent feature selection for VANET safety
3537 -- 3557Avtar Singh, Harpreet Kaur, Navjot Kaur. A novel DDoS detection and mitigation technique using hybrid machine learning model and redirect illegitimate traffic in SDN network
3559 -- 3573Guoao Zhou, Lijuan Yu, Yixin Su, Bingrong Xu, Guoyuan Zhou. Lightweight PCB defect detection algorithm based on MSD-YOLO
3575 -- 3591Lin Zhang, Lizhen Ji, Zongfang Ma. Target positioning method based on B-spline level set and GC Yolo-v3
3593 -- 3613Anusha Nalajala, Thirumalaisamy Ragunathan, Ranesh Naha, Sudheer Kumar Battula. Application and user-specific data prefetching and parallel read algorithms for distributed file systems
3615 -- 3638Nasraldeen Alnor Adam Khleel, Károly Nehéz. Software defect prediction using a bidirectional LSTM network combined with oversampling techniques
3639 -- 3655Alireza Souri, Monire Norouzi, Yousef Alsenani. A new cloud-based cyber-attack detection architecture for hyper-automation process in industrial internet of things
3657 -- 3682Vidyapati Jha, Priyanka Tripathi. Decentralized knowledge discovery using massive heterogenous data in Cognitive IoT
3683 -- 3702Mohd Akbar, Irshad Ahmad, Mohsina Mirza, Manavver Ali, Praveen Barmavatu. Enhanced authentication for de-duplication of big data on cloud storage system using machine learning approach
3703 -- 3716Dong Yang, Ruyan Ren. A method of system selection for shuttle-based storage and retrieval system considering cost and performance
3717 -- 3739Hussam N. Fakhouri, Sadi Alawadi, Feras M. Awaysheh, Faten Hamad. Novel hybrid success history intelligent optimizer with Gaussian transformation: application in CNN hyperparameter tuning
3741 -- 3752Sherif Hamdy Gomaa Salem, Ashraf Yehia Hassan, Marwa S. Moustafa, Mohamed Nabil Hassan. Blockchain-based biometric identity management
3753 -- 3769Ashish R. Chaudhari, Bhavesh N. Gohil, Udai Pratap Rao. A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis
3771 -- 3798Farah Jemili, Rahma Meddeb, Ouajdi Korbaa. Intrusion detection based on ensemble learning for big data classification
3799 -- 3817Mohammad Ali Alizadeh, Somayyeh Jafarali Jassbi, Ahmad Khademzadeh, Majid Haghparast. Novel lightweight and fine-grained fast access control using RNS properties in fog computing
3819 -- 3836Somnath Chatterjee, Vaibhav Shaw, Ranit Das. Multi-stage intrusion detection system aided by grey wolf optimization algorithm
3837 -- 3851Faquan Chen, Miaolei Deng, Hui Gao, Xiaoya Yang, Dexian Zhang. AP-Net: a metallic surface defect detection approach with lightweight adaptive attention and enhanced feature pyramid
3853 -- 3874Kheireddine Zaghouani, Badis Djamaa, Ali Yachir. DRDChain: a blockchain-based distributed resource directory for the internet of things
3875 -- 3892Chanyoung Oh, Saehanseul Yi, Jongkyu Seok, Hyeonjin Jung, Illo Yoon, Youngmin Yi. Hybridhadoop: CPU-GPU hybrid scheduling in hadoop
3893 -- 3910Zhengtao Jiang, Kai Li, Yong Wang, Meilin Liu, Huiqiang Li. A task allocation schema based on response time optimization in cloud computing

Volume 27, Issue 2

1159 -- 1168Nitin Singha, Mahesh K. Singh. Maximizing utility by optimal capacity division in P2P networks
1169 -- 1183Limin Xia, Xiaoyue Ding. Human-object interaction recognition based on interactivity detection and multi-feature fusion
1185 -- 1200Saeid Alirezazadeh, Luís A. Alexandre. Ordered balancing: load balancing for redundant task scheduling in robotic network cloud systems
1201 -- 1215Kemal Akyol. A comprehensive comparison study of traditional classifiers and deep neural networks for forest fire detection
1217 -- 1234Carlos Fernandez-Basso, M. Dolores Ruiz, María J. Martín-Bautista. New Spark solutions for distributed frequent itemset and association rule mining algorithms
1235 -- 1249Ming Mao, Peng Yi, Lilong Hou, Wei Zhao. A controller-based roadside unit plane architecture for software-defined internet of vehicles
1251 -- 1274Shahab Safaee, Meghdad Mirabi, Amir Masoud Rahmani, Ali-Asghar Safaei. A distributed B+Tree indexing method for processing range queries over streaming data
1275 -- 1291Maddila Suresh Kumar, Vadlamani Nagalakshmi. Secure transfer of robust healthcare data using blockchain-based privacy
1293 -- 1312Raseena M. Haris, Khaled M. Khan, Armstrong Nhlabatsi, Mahmoud Barhamgi. A machine learning-based optimization approach for pre-copy live virtual machine migration
1313 -- 1331Kimia Abedpour, Mirsaeid Hosseini Shirvani, Elmira Abedpour. A genetic-based clustering algorithm for efficient resource allocating of IoT applications in layered fog heterogeneous platforms
1333 -- 1360Anisha Kumari, Bibhudatta Sahoo 0001. ACPM: adaptive container provisioning model to mitigate serverless cold-start
1361 -- 1374Gautam Srivastava 0001, Jerry Chun-Wei Lin, Guo Lin. Secure itemset hiding in smart city sensor data
1375 -- 1399Rongxin Chen, Guorong Cai, Jie Chen, Yuling Hong. Integrated method for distributed processing of large XML data
1401 -- 1419Ming Li, Dechang Pi, Shuo Qin. Knowledge-based multi-objective estimation of distribution algorithm for solving reliability constrained cloud workflow scheduling
1421 -- 1469R. Ghafari, Najme Mansouri. Improved Harris Hawks Optimizer with chaotic maps and opposition-based learning for task scheduling in cloud environment
1471 -- 1490Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil. EIoT-DDoS: embedded classification approach for IoT traffic-based DDoS attacks
1491 -- 1502Haythem Bany Salameh, Mohammad Qasem Samara, Ghaleb A. Elrefae, Ahmad F. Al-Ajlouni. Profit-maximization spectrum sharing in opportunistic duopoly market under dynamic spectrum pricing and QoS constraints
1503 -- 1525Seyedeh Shabnam Jazaeri, Sam Jabbehdari, Parvaneh Asghari, Hamid Haj Seyyed Javadi. An efficient edge caching approach for SDN-based IoT environments utilizing the moth flame clustering algorithm
1527 -- 1540Jianing Zhao, Yubiao Pan, Huizhen Zhang, Mingwei Lin, Xin Luo 0001, Zeshui Xu. InPlaceKV: in-place update scheme for SSD-based KV storage systems under update-intensive Worklaods
1541 -- 1558Liyun Zuo, Jieguang He, Yonghui Xu, Lei Zhang. CSADE: a delay-sensitive scheduling method based on task admission and delay evaluation on edge-cloud collaboration
1559 -- 1580Shivangi Shukla, Sankita J. Patel. A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture
1581 -- 1597Shun Wang, Guosun Zeng. Two-stage scheduling for a fluctuant big data stream on heterogeneous servers with multicores in a data center
1599 -- 1610Komal Pursharthi, Dheerendra Mishra. A computationally efficient and randomized RLWE-based key exchange scheme
1611 -- 1623Guangyi Zhao, Simin Kou, Xuesong Yin, Guodao Zhang, Yigang Wang. Self-supervised deep subspace clustering with entropy-norm
1625 -- 1637Ramesh Vatambeti, E. S. Phalguna Krishna, M. Ganesh Karthik, Vijay Kumar Damera. Securing the medical data using enhanced privacy preserving based blockchain technology in Internet of Things
1639 -- 1653Yarasu Madhavi Latha, B. Srinivasa Rao. Product recommendation using enhanced convolutional neural network for e-commerce platform
1655 -- 1665Shorouq Al-Eidi, Omar Darwish 0001, Yuanzhu Chen 0001, Majdi Maabreh, Yahya M. Tashtoush. A deep learning approach for detecting covert timing channel attacks using sequential data
1667 -- 1682Hongjian Li, Jiaxin Liu, Lankai Yang, Liangjie Liu, Hu Sun. An improved arithmetic optimization algorithm for task offloading in mobile edge computing
1683 -- 1697Mohammadreza Ipchi Sheshgelani, Saeid Pashazadeh, Pedram Salehpoor. Framework for wrapping binary swarm optimizers to the hybrid parallel cooperative coevolving version
1699 -- 1718Nairita Sarkar, Pankaj Kumar Keserwani, Mahesh Chandra Govil. A better and fast cloud intrusion detection system using improved squirrel search algorithm and modified deep belief network
1719 -- 1732Keerthi Kethineni, G. Pradeepini. Intrusion detection in internet of things-based smart farming using hybrid deep learning framework
1733 -- 1751Selvam Durairaj, Rajeswari Sridhar. MOM-VMP: multi-objective mayfly optimization algorithm for VM placement supported by principal component analysis (PCA) in cloud data center
1753 -- 1773Jiaxiang Zhang, Linwei Li, Huanlong Zhang, Feng-Xian Wang, Yangyang Tian. A novel sparrow search algorithm with integrates spawning strategy
1775 -- 1797Masoud Nematollahi, Ali Ghaffari, Abbas Mirzaei. Task and resource allocation in the internet of things based on an improved version of the moth-flame optimization algorithm
1799 -- 1819Dina A. Amer, Gamal Attiya, Ibrahim Ziedan. An efficient multi-objective scheduling algorithm based on spider monkey and ant colony optimization in cloud computing
1821 -- 1830William S. Welling, Yanyan Sheng, Michelle M. Zhu. CUDA-aware MPI implementation of Gibbs sampling for an IRT model
1831 -- 1847Jung-Woong Sung, Seung-Jae Han, Jin-Woo Kim. Cloning-based virtual machine pre-provisioning for resource-constrained edge cloud server
1849 -- 1865Higinio Mora, Francisco A. Pujol, Tamai Ramírez, Antonio Jimeno-Morenilla, Julian Szymanski. Network-assisted processing of advanced IoT applications: challenges and proof-of-concept application
1867 -- 1881Xizhen Deng, Mingcan Cen, M. Jiang, Meiqu Lu. Ransomware early detection using deep reinforcement learning on portable executable header
1883 -- 1896Hao Xu, Chengfeng Jian. A meta reinforcement learning-based virtual machine placement algorithm in mobile edge computing
1897 -- 1910Zhongguo Yang, Mingzhu Zhang, Han Li, Weilong Ding. A novel seq2seq-based prediction approach for workflow scheduling
1911 -- 1926Ali Kelkawi, Imtiaz Ahmad, Mohammed El-Abd. Spark-based cooperative coevolution for large scale global optimization
1927 -- 1946Sohaib Asif, Wenhui Yi, Qurrat ul Ain, Yi Yueyang, Jinhai Si. Improving the accuracy of diagnosing and predicting coronary heart disease using ensemble method and feature selection techniques
1947 -- 1964Gyan Singh, Amit K. Chaturvedi. Hybrid modified particle swarm optimization with genetic algorithm (GA) based workflow scheduling in cloud-fog environment for multi-objective optimization
1965 -- 1982Slokashree Padhi, R. B. V. Subramanyam. User request-based scheduling algorithms by managing uncertainty of renewable energy
1983 -- 2001Junfeng Tian, Ruxin Bai, Tianfeng Zhang. Supporting dynamic update scheme for assured deletion based-multi-copy association tree
2003 -- 2027Lei Chen, Changzhou Feng, Yunpeng Ma 0001. Improved Harris Hawks optimization for global optimization and engineering design
2029 -- 2048Muhammad Akraam, Tabasam Rashid, Sohail Zafar. A novel and secure image encryption scheme based on two-dimensional logistic and Arnold Cat map
2049 -- 2058Shaohua Wang, Xiaoxiong Xu. A retrieval method of learners' behavior features based on K-means clustering algorithm
2059 -- 2069Han Yang, Jun Li. Prototypical contrastive learning for image classification
2071 -- 2097Pablo C. Cañizares, Alberto Núñez, Rosa Filgueira, Juan de Lara. Parallel mutation testing for large scale systems
2099 -- 2115Chen Duan, Zhengwei Huang, Yiting Tan, Jintao Min, Ribesh Khanal. Emotion and sentiment analysis for intelligent customer service conversation using a multi-task ensemble framework
2117 -- 2132Ahmed AlEroud, Majd Shariah, Rami Malkawi, Samer Y. Khamaiseh, Abdullah S. Al-Alaj. A privacy-enhanced human activity recognition using GAN & entropy ranking of microaggregated data
2133 -- 2149Donglin Zhu, Siwei Wang, Zuwei Huang, Changjun Zhou, Lin Zhang. A JAYA algorithm based on normal clouds for DNA sequence optimization
2151 -- 2163Abid Jamal, Muhammad Umar Javed, Nabil Ali Alrajeh, Safdar Hussain Bouk, Nadeem Javaid. Blockchain based reputation management, data storage and distributed revocation in vehicular energy networks in smart health care systems
2165 -- 2179Guang Yang, Lidong Han, Jingguo Bi, Fuqun Wang. A collusion-resistant certificateless provable data possession scheme for shared data with user revocation
2181 -- 2201Sofia Strukova, José A. Ruipérez Valiente, Félix Gómez Mármol. Computational approaches to detect experts in distributed online communities: a case study on Reddit
2203 -- 2215Jingze Yu, Wenting Shen. Secure cloud storage auditing with deduplication and efficient data transfer
2217 -- 2238Ahlem Abid, Farah Jemili, Ouajdi Korbaa. Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques
2239 -- 2260Bhaskar Kapoor, Bharti Nagpal. Hybrid cuckoo finch optimisation based machine learning classifier for seizure prediction using EEG signals in IoT network
2261 -- 2272Guangwei Xing, Yanrong Guo, Xiaoxuan Chen, Hangzai Luo, Sheng Zhong 0006. Improving UWB ranging accuracy via multiple network model with second order motion prediction
2273 -- 2290Tamara Dancheva, Unai Alonso, Michael Barton. Cloud benchmarking and performance analysis of an HPC application in Amazon EC2
2291 -- 2307Mohammad Hossein Ghasemian Koochaksaraei, Abolfazl Toroghi Haghighat, Mohammad Hossein Rezvani. An efficient cloud resource exchange model based on the double auction and evolutionary game theory
2309 -- 0Safdar Jamil, Abdul Salam, Awais Khan 0002, Bernd Burgstaller, Sung-Soon Park 0001, Youngjae Kim 0001. +-tree for non-volatile memory devices
2311 -- 0Jinbo Chen, Cao Xiangliang, Han-Chi Fu, Anthony Lam. Retraction Note: Agricultural product monitoring system supported by cloud computing

Volume 27, Issue 10

13421 -- 13433Gaoqiang Dong, Jia Wang, Mingjing Wang, Tingting Su. An improved scheduling with advantage actor-critic for Storm workloads
13435 -- 13453Junnan Liu, Yifan Liu, Yongkang Ding. Research and optimization of task scheduling algorithm based on heterogeneous multi-core processor
13455 -- 13469Sabina Priyadarshini, Tukaram Namdev Sawant, Gitanjali Bhimrao Yadav, J. Premalatha, Sanjay R. Pawar. Enhancing security and scalability by AI/ML workload optimization in the cloud
13471 -- 13515Mohammad H. Nadimi-Shahraki, Shokooh Taghian, Danial Javaheri, Ali Safaa Sadiq, Nima Khodadadi, Seyedali Mirjalili. MTV-SCA: multi-trial vector-based sine cosine algorithm
13517 -- 13530Jie Zhou, Runxin Zhang. A weighted multi-view clustering via sparse graph learning
13531 -- 13546Muhammed Tmeizeh, Carlos Rodríguez-Domínguez, María Visitación Hurtado-Torres. File chunking towards on-chain storage: a blockchain-based data preservation framework
13547 -- 13564Yi Jiang, Jin Xue, Kun Hu, Tianxiang Chen, Tong Wu. Saver: a proactive microservice resource scheduling strategy based on STGCN
13565 -- 13582Feng Xia, Wenhao Cheng. A survey on privacy-preserving federated learning against poisoning attacks
13583 -- 13606Yigit Çagatay Kuyu, Fahri Vatansever. A hybrid approach of ALNS with alternative initialization and acceptance mechanisms for capacitated vehicle routing problems
13607 -- 13620Mohammad Fraiwan, Natheer Khasawneh. Visual identification of sleep spindles in EEG waveform images using deep learning object detection (YOLOv4 vs YOLOX)
13621 -- 13641Rahul Mishra 0002, Dharavath Ramesh, Nazeeruddin Mohammad, Bhaskar Mondal. Blockchain enabled secure pharmaceutical supply chain framework with traceability: an efficient searchable pharmachain approach
13643 -- 13673Essam H. Houssein, Mohammed R. Saad, Youcef Djenouri, Gang Hu, Abdelmgeid A. Ali, Hassan Shaban. Metaheuristic algorithms and their applications in wireless sensor networks: review, open issues, and challenges
13675 -- 13691Pranav Shrivastava, Bashir Alam, Mansaf Alam. An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing
13693 -- 13715Yingying Ning, Jing Li, Ming Zhu, Chuanxi Liu. Service selection based on blockchain smart contracts in cloud-edge environment
13717 -- 13736Yahya M. Tashtoush, Moayyad Alajlouni, Firas AlBalas, Omar A. Darwish. Exploring low-level statistical features of n-grams in phishing URLs: a comparative analysis with high-level features
13737 -- 13748Nouha Arfaoui, Amel Ksibi, Nouf Abdullah Almujally, Ridha Ejbali. Empowering e-learning approach by the use of federated edge computing
13749 -- 13762Sangeeta Sharma, Priyanka Verma, Nitesh Bharot, Amish Ranpariya, Rakesh Porika. PULSE: Proactive uncovering of latent severe anomalous events in IIoT using LSTM-RF model
13763 -- 13775Logesh Rajendran, Virendra Singh Shekhawat. Deep Convolutional Neural Network with a Fuzzy (DCNN-F) technique for energy and time optimized scheduling of cloud computing
13777 -- 13793Adda Boualem, Marwane Ayaida, Cyril De Runz, Hisham A. Kholidy, Hichem Sedjelmaci. Sm-vsn-3c: a new Starlings model-based virtual sensor networks for coverage, connectivity, and data ccommunication
13795 -- 13808Xiaohui Huang, Junyang Wang, Yuan Jiang, Yuanchun Lan. Multi-attention gated temporal graph convolution neural Network for traffic flow forecasting
13809 -- 13834Ankit Sharma, Kriti Bhushan. A hybrid approach based on PUF and ML to protect MQTT based IoT system from DDoS attacks
13835 -- 13869Rui Zhong, Yuefeng Xu, Chao Zhang 0030, Jun Yu 0012. Leveraging large language model to generate a novel metaheuristic algorithm with CRISPE framework
13871 -- 13896Kashif Mehboob Khan, Junaid Arshad, Darakhshan Saleem, Mohammed Alsadi, Shabir Ahmad, Marvi Jokhio. TruPro: a blockchain-based decentralised prosumer electricity trading platform for electrical vehicles (EVs)
13897 -- 13917Ahmad Heydariyan, Farhad Soleimanian Gharehchopogh, Mohammad Reza Ebrahimi Dishabi. A hybrid multi-objective algorithm based on slime mould algorithm and sine cosine algorithm for overlapping community detection in social networks
13919 -- 13944Akhil Chaurasia, Alok Kumar, Udai Pratap Rao. BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment
13945 -- 14004Shuhui Hao, Changcheng Huang, Ali Asghar Heidari, Huiling Chen 0001, Guoxi Liang. An improved weighted mean of vectors optimizer for multi-threshold image segmentation: case study of breast cancer
14005 -- 14035Gang Chen, Hu Sun. Multi-strategy improved sparrow search algorithm based on first definition of ellipse and group co-evolutionary mechanism for engineering optimization problems
14037 -- 14048Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath, Sihem Mesnager. An efficient quantum oblivious transfer protocol
14049 -- 14093Seyed Hossein Seyed Ebrahimi, Kambiz Majidzadeh, Farhad Soleimanian Gharehchopogh. A principal label space transformation and ridge regression-based hybrid gorilla troops optimization and jellyfish search algorithm for multi-label classification
14095 -- 14112Amir Moradi, Fatemeh Rezaei. Intelligent and efficient task caching for mobile edge computing
14113 -- 14130Maher Alharby, Ali Alssaiari, Saad Alateef, Nigel Thomas, Aad van Moorsel. A quantitative analysis of the security of PoW-based blockchains
14131 -- 14148Sourav, Rifaqat Ali. Lattice-based ring signcryption scheme for smart healthcare management
14149 -- 14166Arezoo Ghasemi, Amin Keshavarzi. Energy-efficient virtual machine placement in heterogeneous cloud data centers: a clustering-enhanced multi-objective, multi-reward reinforcement learning approach
14167 -- 14183Huaiyu Guo, Donglin Zhu, Changjun Zhou, Chengye Zou. DNA sequences design under many objective evolutionary algorithm
14185 -- 14229Boli Zheng, Yi Chen 0023, Chaofan Wang, Ali Asghar Heidari, Lei Liu, Huiling Chen 0001, Xiaowei Chen, Peirong Chen. Stochastic biogeography-based learning improved RIME algorithm: application to image segmentation of lupus nephritis
14231 -- 14245Xiaoxiao Liu, Yan Zhao, Shigang Wang, Jian Wei. G-SAM: GMM-based segment anything model for medical image classification and segmentation
14247 -- 14267Walid K. Ghamry, Suzan Shukry. Channel estimation for RIS-aided MIMO systems in MmWave wireless communications with a few active elements
14269 -- 14282Lin-Tao Duan, Jin Wang, Hai-Ying Wang. An energy-aware ant colony optimization strategy for virtual machine placement in cloud computing
14283 -- 14294Avuthu Avinash Reddy, Ramesh Babu Battula, Dinesh Gopalani. Performance analysis of ML models on 5G sub-6 GHz bands: An experimental study
14295 -- 14313Behaylu Tadele Alemu, Alemu Jorgi Muhammed, Habtamu Molla Belachew, Mulatu Yirga Beyene. A comprehensive detection and mitigation mechanism to protect SD-IoV systems against controller-targeted DDoS attacks
14315 -- 14364Essam H. Houssein, Marwa M. Emam, Narinder Singh, Nagwan M. Abdel Samee, Maali Alabdulhafith, Emre Çelik. An improved honey badger algorithm for global optimization and multilevel thresholding segmentation: real case with brain tumor images
14365 -- 14385Essam H. Houssein, Asmaa Hammad, Nagwan M. Abdel Samee, Manal Abdullah Alohali, Abdelmgeid A. Ali. TFCNN-BiGRU with self-attention mechanism for automatic human emotion recognition using multi-channel EEG data
14387 -- 14415Bhabani Sankar Samantray, K. Hemant Kumar Reddy. Blockchain enabled secured, smart healthcare system for smart cities: a systematic review on architecture, technology, and service management
14417 -- 14449Bilal H. Abed-alguni, Basil M. Alzboun, Noor Aldeen Alawad. BOC-PDO: an intrusion detection model using binary opposition cellular prairie dog optimization algorithm
14451 -- 14468Preetesh Purohit, Anuradha Purohit, Vrinda Tokekar. Localization of try block and generation of catch block to handle exception using an improved LSTM
14469 -- 14514Chuan Li, Yanjie Zhu. A hybrid butterfly and Newton-Raphson swarm intelligence algorithm based on opposition-based learning
14515 -- 14538Hong Huang, Yu Wang, Yue Cai, Hong Wang. A novel approach for energy consumption management in cloud centers based on adaptive fuzzy neural systems
14539 -- 14556Feiyan Guo, Bing Tang, Ying Wang, Xiaoqing Luo. Vehicle edge server deployment based on reinforcement learning in cloud-edge collaborative environment
14557 -- 14584Reham R. Mostafa, Fatma A. Hashim, Amit Chhabra, Ghaith Manita, Yaning Xiao. Empowering bonobo optimizer for global optimization and cloud scheduling problem
14585 -- 14609Shabnam Bawa, Prashant Singh Rana, Rajkumar Tekchandani. Migration of containers on the basis of load prediction with dynamic inertia weight based PSO algorithm
14611 -- 14635Mostafa Abodawood, Abeer Twakol Khalil, Hanan M. Amer, Mohamed Maher Ata. Enhancing image encryption using chaotic maps: a multi-map approach for robust security and performance optimization
14637 -- 14668Amir Pakmehr, Andreas Aßmuth, Negar Taheri, Ali Ghaffari. DDoS attack detection techniques in IoT networks: a survey
14669 -- 14684Zhe Wang, Shuangbai He, Guoan Li. Secure speech-recognition data transfer in the internet of things using a power system and a tried-and-true key generation technique
14685 -- 14727Xinyi Chen, Mengjian Zhang, Ming Yang 0030, Deguang Wang. A multi-strategy improved beluga whale optimization algorithm for constrained engineering problems
14729 -- 14744Mazahir Hussain, Buseung Cho. HPTCollector: high-performance telemetry collector
14745 -- 14766Essam H. Houssein, Gaber M. Mohamed, Youcef Djenouri, Yaser Maher Wazery, Ibrahim A. Ibrahim. Nature inspired optimization algorithms for medical image segmentation: a comprehensive review
14767 -- 14810Mohamed A. Elseify, Salah Kamel, Loai Nasrat. An improved moth flame optimization for optimal DG and battery energy storage allocation in distribution systems
14811 -- 14834Narender Reddy Kampelli, B. N. Bhandari. A scalable and power efficient MAC protocol with adaptive TDMA for M2M communication
14835 -- 14890Arpita Srivastava, Ditipriya Sinha. PSO-ACO-based bi-phase lightweight intrusion detection system combined with GA optimized ensemble classifiers
14891 -- 14949Jinge Shi, Yi Chen 0023, Zhennao Cai, Ali Asghar Heidari, Huiling Chen 0001, Qiuxiang He. Multi-threshold image segmentation using a boosted whale optimization: case study of breast invasive ductal carcinomas
14951 -- 14975Sumit Sharma 0007, Sarika Jain 0001. OntoXAI: a semantic web rule language approach for explainable artificial intelligence
14977 -- 15002Jamil Alshaqsi, Wenjia Wang, Osama Drogham, Rami S. Alkhawaldeh. Quantitative and qualitative similarity measure for data clustering analysis

Volume 27, Issue 1

1 -- 26Devon Myers, Rami Mohawesh, Venkata Ishwarya Chellaboina, Anantha Lakshmi Sathvik, Praveen Venkatesh, Yi-Hui Ho, Hanna Henshaw, Muna Al-Hawawreh, David Berdik, Yaser Jararweh. Foundation and large language models: fundamentals, challenges, opportunities, and social impacts
27 -- 52Kamta Nath Mishra, Vandana Bhattacharjee, Shashwat Saket, Shivam P. Mishra. Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach
53 -- 70Sanna Mehraj Kak, Parul Agarwal, M. Afshar Alam, Farheen Siddiqui. A hybridized approach for minimizing energy in cloud computing
71 -- 90Abdul Jabbar Saeed Tipu, Padraig Ó Conbhuí, Enda Howley. Artificial neural networks based predictions towards the auto-tuning and optimization of parallel IO bandwidth in HPC system
91 -- 107Peng Zhou, Longxin Lin, Zhen Zhang 0017, Yuhui Deng, Tengjiao He. GHB: a cost-effective and energy-efficient data center network structure with greater incremental scalability
109 -- 117Puneet Sharma, Manoj Kumar, Ashish Sharma 0003. Machine learning based file type classifier designing in IoT cloud
119 -- 135Yuan Zhao 0003, Kang Chen, Zhisheng Ye 0003, Zhiyu Xiang, Qi Lu. Multi-input cloud resource allocation strategy with limited buffer and virtual machine synchronization failure
137 -- 157Yunwei Jia, Keke Lu, Xia Li, Chenxiang Hao. SRG: a clustering algorithm based on scale division and region growing
159 -- 175Maribell Sacanamboy. Heuristic algorithm for task mapping problem in a hierarchical wireless network-on-chip architecture
177 -- 197Chunlin Li 0001, Kun Jiang, Xinyong Li, Libin Zhang, Youlong Luo. Single-tag and multi-tag RFID data cleaning approach in edge computing
199 -- 217Maryam Mirzapour-Moshizi, Vahid Sattari Naeini, Amir Sabbagh Molahosseini. Application placement in fog-cum-cloud environment based on a low latency policy-making framework
219 -- 229Ankur Jain, Chandrashekar Jatoth, G. R. Gangadharan. Bi-level optimization of resource allocation and appliance scheduling in residential areas using a Fog of Things (FOT) framework
231 -- 267Malik Braik. Hybrid enhanced whale optimization algorithm for contrast and detail enhancement of color images
269 -- 284Prakhar Sharma, W. Wilfred Godfrey, Aditya Trivedi. When blockchain meets IoT: a comparison of the performance of communication protocols in a decentralized identity solution for IoT using blockchain
285 -- 297Lacchita Soni, Harish Chandra, Daya Sagar Gupta, Ram Keval. Quantum-resistant public-key encryption and signature schemes with smaller key sizes
299 -- 311Ali Hamdan Alenezi, Mahmoud Nazzal, Ahmed Sawalmeh, Abdallah Khreishah, Sihua Shao, Muhannad Almutiry. Machine learning regression-based RETRO-VLP for real-time and stabilized indoor positioning
313 -- 324Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, José Rafael Buendía Rubio, Gérôme Bovet, Gregorio Martínez Pérez. Robust Federated Learning for execution time-based device model identification under label-flipping attack
325 -- 339Ahmed Cherif Mazari, Nesrine Boudoukhani, Abdelhamid Djeffal. BERT-based ensemble learning for multi-aspect hate speech detection
341 -- 376Mahfooz Alam, Mohammad Shahid, Suhel Mustajab. Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment
377 -- 394Chao Jing, Jiaming Li. CBLA_PM: an improved ann-based power consumption prediction algorithm for multi-type jobs on heterogeneous computing server
395 -- 409Ramraj Dangi, Praveen Lalwani. Harris Hawks optimization based hybrid deep learning model for efficient network slicing in 5G network
411 -- 441Xian Wu, Wenju Zhou, Minrui Fei, Yonglu Du, Huiyu Zhou 0001. Banyan tree growth optimization and application
443 -- 455Rahim Sadigov, Elif Yildirim, Büsra Kocaçinar, Fatma Patlar Akbulut, Cagatay Catal. Deep learning-based user experience evaluation in distance learning
457 -- 476Qinlu He, Fan Zhang, Genqing Bian, Weiqi Zhang, Zhen Li, Zhimin Yu, Hao Feng. File block multi-replica management technology in cloud storage
477 -- 497Liang Yang, Rong Jiang, Xuetao Pu, Chenguang Wang, Yue Yang, Meng Wang, Lin Zhang, Feifei Tian. An access control model based on blockchain master-sidechain collaboration
499 -- 513Prashant G. Ahire, Pramod D. Patil. CAC-WOA: context aware clustering with whale optimization algorithm for knowledge discovery from multidimensional space in electricity application
515 -- 529Haiying Liu, Kun Wu, Kuihua Huang, Guangquan Cheng, Rui Wang, Guohua Liu. Optimization of large-scale UAV cluster confrontation game based on integrated evolution strategy
531 -- 546Nisha Pal, Mahendra Pratap Yadav, Dharmendra Kumar-Yadav. Appropriate number of analogues in analogy based software effort estimation using quality datasets
547 -- 562Zaid Albataineh, Fatima Aldrweesh, Mohammad A. Alzubaidi. COVID-19 CT-images diagnosis and severity assessment using machine learning algorithm
563 -- 573Lavanya Settipalli, G. R. Gangadharan, Sivaiah Bellamkonda. An extended lightweight blockchain based collaborative healthcare system for fraud prevention
575 -- 587Abdelhak Goudjil, Mathieu Pouliquen, Eric Pigeon, Olivier Gehan. On-line outer bounding ellipsoid algorithm for clustering of hyperplanes in the presence of bounded noise
589 -- 605Chengfeng Jian, Zhuoyang Pan, Lukun Bao, Meiyu Zhang. Online-learning task scheduling with GNN-RL scheduler in collaborative edge computing
607 -- 627Paluck Arora, Rajesh Mehta, Rohit Ahuja. An adaptive medical image registration using hybridization of teaching learning-based optimization with affine and speeded up robust features with projective transformation
629 -- 654Zakaria Alomari, Mohammad Al-Oudat, Suboh Alkhushayni. Pricing the cloud based on multi-attribute auction mechanism
655 -- 671Ramesh Vatambeti, Srihari Varma Mantena, K. V. D. Kiran, M. Manohar, Chinthakunta Manjunath. Twitter sentiment analysis on online food services based on elephant herd optimization with hybrid deep learning technique
673 -- 687Rashmi Kushwah. A novel traffic aware reliable gateway selection in wireless mesh network
689 -- 705Bhushan Inje, Kapil Kumar Nagwanshi, Radha Krishna Rambola. An efficient document information retrieval using hybrid global search optimization algorithm with density based clustering technique
707 -- 720Rima Grati, Faiza Loukil, Khouloud Boukadi, Mourad Abed. A blockchain-based framework for circular end-of-life vehicle processing
721 -- 735Shamsher Ullah, Jiangbin Zheng, Muhammad Tanveer Hussain, Muhammad Wasif Sardar, Muhammad Umar Farooq 0002, Salabat Khan. An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing
737 -- 760Sofian Kassaymeh, Mohammed Alweshah, Mohammed Azmi Al-Betar, Abdelaziz I. Hammouri, Mohammad Atwah Al-Ma'aitah. Software effort estimation modeling and fully connected artificial neural network optimization using soft computing techniques
761 -- 785Rayees Ahamad, Kamta Nath Mishra. Hybrid approach for suspicious object surveillance using video clips and UAV images in cloud-IoT-based computing environment
787 -- 825Nazli Gulum Mutlu, Serkan Altuntas. Analyzing factors influencing the severity of occupational accidents in textile industry using decision tree algorithms
827 -- 843Mahshid Rezakhani, Nazanin Sarrafzadeh-Ghadimi, Reza Entezari-Maleki, Leonel Sousa, Ali Movaghar 0001. Energy-aware QoS-based dynamic virtual machine consolidation approach based on RL and ANN
845 -- 858Mansoureh Zare, Yasser Elmi Sola, Hesam Hasanpour. Imperialist competitive based approach for efficient deployment of IoT services in fog computing
859 -- 873Mingliang Gao 0001, Alireza Souri, Mayram Zaker, Wenzhe Zhai, Xiangyu Guo, Qilei Li. A comprehensive analysis for crowd counting methodologies and algorithms in Internet of Things
875 -- 891Assia Brighen, Hachem Slimani, Abdelmounaam Rezgui, Hamamache Kheddouci. A new distributed graph coloring algorithm for large graphs
893 -- 912Muhammad Faraz Hyder, Tasbiha Fatima, Saadia Arshad. Towards adding digital forensics capabilities in software defined networking based moving target defense
913 -- 930Jiahui Ma, Jinxiang Chen, Ligang Dong, Xian Jiang. Research on placement of distributed SDN multiple controllers based on IAVOA
931 -- 944Gunaganti Sravanthi, Nageswara Rao Moparthi. Dual Interactive Wasserstein Generative Adversarial Network optimized with arithmetic optimization algorithm-based job scheduling in cloud-based IoT
945 -- 958Sarah Alhozaimy, Daniel A. Menascé, Massimiliano Albanese. Design and modeling of moving target defense in workflow-based applications
959 -- 976Poly Sil Sen, Nandini Mukherjee. An ontology-based approach to designing a NoSQL database for semi-structured and unstructured health data
977 -- 996Hela Taktak, Khouloud Boukadi, Firas Zouari, Chirine Ghedira Guégan, Michael Mrissa, Faïez Gargouri. A knowledge-driven service composition framework for wildfire prediction
997 -- 1015Debadatta Naik, Ramesh Dharavath, Lianyong Qi. Quantum-PSO based unsupervised clustering of users in social networks using attributes
1017 -- 1046Tianqi Bu, Zanyu Huang, Kairui Zhang, Yang Wang, Haobin Song, Jietong Zhou, Zhangjun Ren, Sen Liu. Task scheduling in the internet of things: challenges, solutions, and future trends
1047 -- 1061Jasleen Kaur, Rinkle Rani, Nidhi Kalra. Attribute-based access control scheme for secure storage and sharing of EHRs using blockchain and IPFS
1063 -- 1087Ridhima Rani, Neeraj Kumar 0001, Meenu Khurana. Redundancy elimination in IoT oriented big data: a survey, schemes, open challenges and future applications
1089 -- 1108Alper Ozcan, Ahmet Kasif, Ismail Veli Sezgin, Cagatay Catal, Muhammad Sanwal, Hasan Merdun. Deep learning-based modelling of pyrolysis
1109 -- 1123Rong Gong, Delun Li, Lila Hong, Ningxin Xie. Task scheduling in cloud computing environment based on enhanced marine predator algorithm
1125 -- 1136Lei Zeng, Shadi G. Alawneh, Seyed Ali Arefifar. Parallel multi-GPU implementation of fast decoupled power flow solver with hybrid architecture
1137 -- 1158Huifang Li 0002, Bing Chen, Jingwei Huang, Julio Ruben Cañizares Abreu, Senchun Chai, Yuanqing Xia. Mutation-driven and population grouping PRO algorithm for scheduling budget-constrained workflows in the cloud