![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessABWOA: adaptive boundary whale optimization algorithm for large-scale digital twin network construction
Digital twin network (DTN) as an emerging network paradigm, have garnered growing attention. For large-scale networks, a crucial problem is how to effectively map physical networks onto the infrastructure plat...
-
Article
Open AccessCorrection: FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records
-
Article
Open AccessEdge computing-oriented smart agricultural supply chain mechanism with auction and fuzzy neural networks
Powered by data-driven technologies, precision agriculture offers immense productivity and sustainability benefits. However, fragmentation across farmlands necessitates distributed transparent automation. We d...
-
Article
Open AccessFLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records
With the rapid growth of Internet of Vehicles (IoV) technology, the performance and privacy of IoV terminals (IoVT) have become increasingly important. This paper proposes a federated learning model for IoVT c...
-
Article
Open AccessBlockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials
Industrial data trading can considerably enhance the economic and social value of abundant data resources. However, traditional data trading models are plagued by critical flaws in fairness, security, privacy ...
-
Article
Open AccessA new method of dynamic network security analysis based on dynamic uncertain causality graph
In the context of cloud computing, network attackers usually exhibit complex, dynamic, and diverse behavior characteristics. Existing research methods, such as Bayesian attack graphs, lack evidence correlation...
-
Article
Open AccessSmall object Lentinula Edodes logs contamination detection method based on improved YOLOv7 in edge-cloud computing
A small object Lentinus Edodes logs contamination detection method (SRW-YOLO) based on improved YOLOv7 in edge-cloud computing environment was proposed to address the problem of the difficulty in the detection...
-
Article
Open AccessHypergraph convolution mix DDPG for multi-aerial base station deployment
Aerial base stations (AeBS), as crucial components of air-ground integrated networks, can serve as the edge nodes to provide flexible services to ground users. Optimizing the deployment of multiple AeBSs to ma...
-
Article
Open AccessPPO-based deployment and phase control for movable intelligent reflecting surface
Intelligent reflecting surface (IRS) stands as a promising technology to revolutionize wireless communication by manipulating incident signal amplitudes and phases to enhance system performance. While existing...
-
Article
Open AccessLAE-GAN: a novel cloud-based Low-light Attention Enhancement Generative Adversarial Network for unpaired text images
With the widespread adoption of mobile multimedia devices, the deployment of compute-intensive inference tasks on edge and resource-constrained devices, particularly in the context of low-light text detection,...
-
Article
Open AccessHAP-assisted multi-aerial base station deployment for capacity enhancement via federated deep reinforcement learning
Aerial base stations (AeBSs), as crucial components of air-ground integrated networks, are widely employed in cloud computing, disaster relief, and various applications. How to quickly and efficiently deploy m...
-
Article
Open AccessA deep reinforcement learning assisted task offloading and resource allocation approach towards self-driving object detection
With the development of communication technology and mobile edge computing (MEC), self-driving has received more and more research interests. However, most object detection tasks for self-driving vehicles are ...
-
Article
Open AccessCollaborative on-demand dynamic deployment via deep reinforcement learning for IoV service in multi edge clouds
In vehicular edge computing, the low-delay services are invoked by the vehicles from the edge clouds while the vehicles moving on the roads. Because of the insufficiency of computing capacity and storage resou...
-
Article
Open AccessBlockchain-based collaborative edge computing: efficiency, incentive and trust
The rise of 5G technology has driven the development of edge computing. Computation offloading is the key and challenging point in edge computing, which investigates offloading resource-intensive computing tas...
-
Article
Open AccessBlockchain enabled zero trust based authentication scheme for railway communication networks
With the introduction of emerging technologies such as cloud computing, the railway communication network has the characteristics of complex structure and blurred boundaries, which leads to a series of securit...
-
Article
Open AccessArtificial intelligence and edge computing for teaching quality evaluation based on 5G-enabled wireless communication technology
Cloud computing and artificial intelligence are now widely used for classroom teaching in higher learning institutes. The digital teaching supported to ICT technologies in colleges serves as a central point fo...
-
Article
Open AccessNIDD: an intelligent network intrusion detection model for nursing homes
In nursing homes using technologies such as IoT, big data, cloud computing, and machine learning, there is a constant risk of attacks such as Brute Force FTP, Brute Force SSH, Web Attack, Infiltration, and Bot...
-
Article
Open AccessA novel vehicular task deployment method in hybrid MEC
With the skyrocketing need for low-latency services on the Internet of Vehicles (IoV) and elastic cross-layer resource provisioning, multi-access edge computing (MEC) is considered a high-potent solution, whic...
-
Article
Open AccessA maturity model for AI-empowered cloud-native databases: from the perspective of resource management
Cloud-native database systems have started to gain broad support and popularity due to more and more applications and systems moving to the cloud. Various cloud-native databases have been emerging in recent ye...
-
Article
Open AccessA novel privacy-preserving speech recognition framework using bidirectional LSTM
Utilizing speech as the transmission medium in Internet of things (IoTs) is an effective way to reduce latency while improving the efficiency of human-machine interaction. In the field of speech recognition, R...