Search
Search Results
-
Sm-vsn-3c: a new Starlings model-based virtual sensor networks for coverage, connectivity, and data ccommunication
The study of continuous natural or industrial phenomena in time and space requires the emergence of new wireless sensor networks. A virtual sensor...
-
Deep Convolutional Neural Network with a Fuzzy (DCNN-F) technique for energy and time optimized scheduling of cloud computing
Self-adaptive deep learning techniques provide scalability and flexibility in deploying and administrating deep learning models in the cloud...
-
Multi-attention gated temporal graph convolution neural Network for traffic flow forecasting
Real-time and accurate traffic flow forecasting plays a crucial role in transportation systems and holds great significance for urban traffic...
-
VLSI implementation of an energy-efficient color image compressor using improved block truncation coding and enhanced Golomb-rice coding for wireless sensor networks
The very large-scale integration implementation of a unique hardware-oriented image compression technique for wireless sensor networks (WSNs) is...
-
PULSE: Proactive uncovering of latent severe anomalous events in IIoT using LSTM-RF model
In the IIoT, billions of devices continually provide information that is extremely diverse, variable, and large-scale and presents significant...
-
A hybrid neural network for urban rail transit short-term flow prediction
Accurate and rapid short-term passenger flow prediction is the foundation for safe and efficient operation of urban rail transit systems. The urban...
-
A robust two-step algorithm for community detection based on node similarity
The rapid development of the internet and social network platforms has given rise to a new field of research, social network analysis. This field of...
-
LATA: learning automata-based task assignment on heterogeneous cloud computing platform
A cloud computing environment is a distributed system where idle resources are accessible across a wide area network, such as the Internet. Due to...
-
Exploring low-level statistical features of n-grams in phishing URLs: a comparative analysis with high-level features
Phishing attacks are the biggest cybersecurity threats in the digital world. Attackers exploit users by impersonating real, authentic websites to...
-
A cloud-fog distributed trust service for wireless sensor networks
In wireless sensor networks (WSNs), data aggregation techniques are used to reduce energy consumption of the sensors and extend the network lifetime....
-
Empowering e-learning approach by the use of federated edge computing
Federated learning (FL) is a decentralized approach to training machine learning model. In the traditional architecture, the training requires...
-
IoV security and privacy survey: issues, countermeasures, and challenges
As a growing up-and-coming branch of the Internet of Things and traditional vehicular ad hoc networks, the Internet of Vehicles (IoV) is intended to...
-
Hardware architecture and memristor-crossbar implementation of type-2 fuzzy system with type reduction and in-situ training
The Type-2 fuzzy set is a fuzzy set with fuzzy membership degrees. This set is used when accurately determining the membership degree of a fuzzy set...
-
Proteo: a framework for the generation and evaluation of malleable MPI applications
Applying malleability to HPC systems can increase their productivity without degrading or even improving the performance of running applications....
-
Energy-Constrained DAG Scheduling on Edge and Cloud Servers with Overlapped Communication and Computation
Mobile edge computing (MEC) has been widely applied to numerous areas and aspects of human life and modern society. Many such applications can be...
-
Metaheuristic algorithms and their applications in wireless sensor networks: review, open issues, and challenges
Metaheuristic algorithms have wide applicability, particularly in wireless sensor networks (WSNs), due to their superior skill in solving and...
-
Service selection based on blockchain smart contracts in cloud-edge environment
The rapid integration of cloud computing and edge computing has brought the cloud-edge environment into the spotlight in information technology....
-
Enhancing 3D localization in wireless sensor network: a differential evolution method for the DV-Hop algorithm
Wireless sensor network is large-scale, self-organizing and reliable. It is widely used in the military, disaster management, environmental...
-
Blockchain enabled secure pharmaceutical supply chain framework with traceability: an efficient searchable pharmachain approach
The complex networks of manufacturers, suppliers, retailers, and customers that make up today’s pharmaceutical supply chain span worldwide. As it is,...
-
An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing
Nowadays, the need for cloud computing has increased due to the exponential growth in information transmission. Cybercriminals are persistent in...