Search
Search Results
-
Lattice-based device-to-device authentication and key exchange protocol for IoT system
Protecting IoT environments from the increasing number of cyber threats has grown more important as the number of Internet of Things (IoT) devices...
-
A new approach for service activation management in fog computing using Cat Swarm Optimization algorithm
Today, with the increasing expansion of IoT devices and the growing number of user requests, processing their demands in computational environments...
-
Qualitative reasoning and cyber-physical systems: abstraction, modeling, and optimized simulation
Complex systems modeling and simulation are critical in many industrial and research fields, specifically to predict, prove, verify, and understand...
-
Nature inspired recommendation with path optimization for online social network communities
Human sentiment prevalent in online dialogues largely governs the formation of communities in online social networks. These recommendation methods...
-
SymboleoPC: checking properties of legal contracts
Legal contracts specify requirements for business transactions. Symboleo was recently proposed as a formal specification language for legal...
-
Guest editorial to the special section on PoEM’2022
This guest editorial presents the papers contributing to the 15th IFIP WG 8.1 Working Conference on the Practice of Enterprise Modelling (PoEM 2022)....
-
Transfer learning for emotion detection in conversational text: a hybrid deep learning approach with pre-trained embeddings
Understanding the emotions and sentiments from conversations has relevance in many application areas. Specifically, conversational agents,...
-
Enhancing computation reuse efficiency in ICN-based edge computing by modifying content store table structure
In edge computing, repetitive computations are a common occurrence. However, the traditional TCP/IP architecture used in edge computing fails to...
-
Smart contracts auditing and multi-classification using machine learning algorithms: an efficient vulnerability detection in ethereum blockchain
The adoption of Smart Contracts has revolutionized industries like DeFi and supply chain management, streamlining processes and enhancing...
-
Delineation of ECG waveform components using encoder-decoder architecture with Postprocess algorithm
With the exponential increase in heart disease cases, it is essential to construct models (algorithms) that can be used to delineate...
-
Enhancing virtual machine placement efficiency in cloud data centers: a hybrid approach using multi-objective reinforcement learning and clustering strategies
Deploying virtual machines poses a significant challenge for cloud data centers, requiring careful consideration of various objectives such as...
-
Modeling end-to-end delays in TSCH wireless sensor networks using queuing theory and combinatorics
Wireless communication offers significant advantages in terms of flexibility, coverage and maintenance compared to wired solutions and is being...
-
Energy efficient dynamic resource allocation in C-RAN using tunicate swarm and whale optimization algorithm
In Cloud radio access network (C-RAN) architecture, the signals are processed through cloud-computing method where the baseband units (BBUs) of all...
-
Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification
With the development of Internet technology, cyberspace security has become a research hotspot. Network traffic classification is closely related to...
-
A novel approach to detect, analyze and block adversarial web pages
The phenomenon of distraction is very common, and its adverse effects are seen among people. The major cause underlying this issue is the ease with...
-
Detecting review fraud using metaheuristic graph neural networks
Although online reviews play a critical role in sha** consumer behavior and establishing institutional trust, this reliance on online reviews has...
-
Analysis of channel capacity for UWB antenna for improvements in the data rates and low Power transmission over wireless application
Multiple input- Multiple output- Ultra-wideband (MIMO-UWB) is a wireless communication approach that combines multiple antennas at the transmitter...
-
A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC
Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector has evolved significantly in recent years. However,...
-
Unmasking GAN-Generated Faces with Optimal Deep Learning and Cognitive Computing-Based Cutting-Edge Detection System
The emergence of deep learning (DL) has improved the excellence of generated media. However, with the enlarged level of photorealism, synthetic media...
-
A survey of multi-population optimization algorithms for tracking the moving optimum in dynamic environments
The solution spaces of many real-world optimization problems change over time. Such problems are called dynamic optimization problems (DOPs), which...