![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
133 Result(s)
-
Article
Anonymizing Big Data Streams Using In-memory Processing: A Novel Model Based on One-time Clustering
Big data privacy preservation is a critical challenge for data mining and data analysis. Existing methods for anonymizing big data streams using k-anonymity algorithms may cause high data loss, low data qualit...
-
Article
Edge artificial intelligence for big data: a systematic review
Edge computing, artificial intelligence (AI), and machine learning (ML) concepts have become increasingly prevalent in Internet of Things (IoT) applications. As the number of IoT devices continues to grow, rel...
-
Article
Deep learning applications in the Internet of Things: a review, tools, and future directions
The emergence of the Internet of Things (IoT) has enabled the proliferation of interconnected devices and sensors, generating vast amounts of often complex and unstructured data. Deep learning (DL), a subfield...
-
Article
Direction based method for representing and querying fuzzy regions
Uncertainty management for geometric data is a fundamental issue for spatial databases, image databases, and spatial data systems, such as geographic information systems. Currently, spatial database systems ca...
-
Article
A Survey of Artificial Hummingbird Algorithm and Its Variants: Statistical Analysis, Performance Evaluation, and Structural Reviewing
In the last few decades, metaheuristic algorithms that use the laws of nature have been used dramatically in numerous and complex optimization problems. The artificial hummingbird algorithm (AHA) is one of the...
-
Article
A distributed load balancing method for IoT/Fog/Cloud environments with volatile resource support
In cloud/fog-based environments, resource management is an important and challenging process. The deadline-based workflow scheduling mechanism is a common practice in such systems to overcome the complexities ...
-
Article
Robust intrusion detection for network communication on the Internet of Things: a hybrid machine learning approach
The importance and growth of the Internet of Things (IoT) in computer networks and applications have been increasing. Additionally, many of these applications generate large volumes of data, which are critical...
-
Article
Lane and Platoon Assignment in Intelligent Transportation System: A Novel Heuristic Approach
The right lane and platoon assignment to a vehicle significantly impacts achieving the desired driving goals to improve occupants’ safety or reduce pollution. Preparing an intelligent assistant to address this...
-
Article
A distributed B+Tree indexing method for processing range queries over streaming data
A data stream exhibits as a massive unbounded sequence of data elements continuously generated at a high rate. Stream databases raise new challenges for query processing due to both the streaming nature of dat...
-
Article
Analyzing the impact of various parameters on job scheduling in the Google cluster dataset
Cloud architecture and its operations interest both general consumers and researchers. Google, as a technology giant, offers cloud services globally. This paper analyzes the Google cluster usage trace, focusin...
-
Article
An Intelligent Algorithm to Predict GDP Rate and Find a Relationship Between COVID-19 Outbreak and Economic Downturn
With the spread of COVID-19, economic damages are challenging for governments and people’s livelihood besides its dangerous and negative impact on humanity's health, which can be led to death. Various health g...
-
Article
Data Replication Methods in Cloud, Fog, and Edge Computing: A Systematic Literature Review
Nowadays, a large amount of data is being generated and these data are usually stored in distributed environments such as cloud, fog, and edge environments. Data replication, which is commonly used to manage l...
-
Article
An Adaptable Algorithm for Optimizing Bus Line Distribution Using the Clustering Method
The current fleet of cars requires reevaluation, upgrades, and replacement in response to the expanding human population, the increase in urban traffic volume, and the elevated levels of air pollution attribut...
-
Article
A decentralized prediction-based workflow load balancing architecture for cloud/fog/IoT environments
Processing of data gathered from new communication devices, such as Internet of Things (IoT)-based technology, has grown dramatically in the past decade. Resource management plays a vital role in cloud/fog-bas...
-
Article
Automatic text summarization using deep reinforced model coupling contextualized word representation and attention mechanism
With the rapid and unprecedented growth of textual data in recent years, there is a remarkable need for automatic text summarization models to retrieve useful information from these large numbers of textual do...
-
Chapter
Metaverse in Medicine: Medical Internet of Things (MIoT)
Medical Internet of Things (MIoT) has been integrated with biosensors, wearable sensors, and other medical devices to facilitate the timely diagnosis and prediction of acute diseases. However, security and pri...
-
Article
Open AccessDesigning secure PUF-based authentication protocols for constrained environments
Physical Unclonable Functions (PUFs) are widely used in cryptographic authentication and key-agreement protocols due to their unique physical properties. This article presents a comprehensive cryptanalysis of ...
-
Article
Providing and evaluating a comprehensive model for detecting fraudulent electronic payment card transactions with a two-level filter based on flow processing in big data
Previous research on fraud detection modeling is often based on a single algorithm, optimizing categories and clusters to find fraudulent patterns that they have provided unsupervised or supervised methods alo...
-
Article
Resource Management approaches to Internet of Vehicles
The Internet of Vehicles (IoV) has become a significant issue in designing smart cities. Many applications and services are provided in IoV for various purposes. They need the resources for the computation and...
-
Article
A Model to Detect the Fraud of Electronic Payment Card Transactions Based on Stream Processing in Big Data
With the growing use of electronic cash cards, the number of transactions with these cards has also increased rapidly, so the importance of using fraud detection models has been paid attention to by financial ...