-
Article
Bi-level optimization of resource allocation and appliance scheduling in residential areas using a Fog of Things (FOT) framework
Fog computing has become a state-of-art technology for cloud applications in collaboration with physical IOT devices on the edge of the network.We propose a Fog of Things (FOT) framework for optimized resource...
-
Article
An extended lightweight blockchain based collaborative healthcare system for fraud prevention
Multiple benefits (submitting healthcare bills to one or more organizations) and data breaches (tampering of healthcare data by healthcare organization authorities) are typical frauds happening due to the cent...
-
Article
Mental stress detection from ultra-short heart rate variability using explainable graph convolutional network with network pruning and quantisation
This study introduces a novel pruning approach based on explainable graph convolutional networks, strategically amalgamating pruning and quantisation, aimed to tackle the complexities associated with existing ...
-
Article
Open AccessMultimodal classification of Alzheimer's disease and mild cognitive impairment using custom MKSCDDL kernel over CNN with transparent decision-making for explainable diagnosis
The study presents an innovative diagnostic framework that synergises Convolutional Neural Networks (CNNs) with a Multi-feature Kernel Supervised within-class-similar Discriminative Dictionary Learning (MKSCDD...
-
Article
Provider profiling and labeling of fraudulent health insurance claims using Weighted MultiTree
Recently, healthcare organizations getting engross in digitizing the health insurance system. Besides its undeniable benefits, the risk of exaggerating a claim or entirely fabricating one by providers is incre...
-
Chapter
An Enhanced Model for Fake News Detection in Social Media Using Hybrid Text Representation
In today’s digital age, the majority of people obtain their news via the Internet and social media. However, it is difficult to identify which sources are reliable and which are disseminating false information...
-
Article
SecAuth-SaaS: a hierarchical certificateless aggregate signature for secure collaborative SaaS authentication in cloud computing
Collaborative cloud business models enable a new dimension of business by giving option to the third party software vendors to deploy their software in the cloud for offering software as a service (SaaS) to th...
-
Chapter and Conference Paper
An Optimal Wavelet Detailed-Coefficient Determination Using Time-Series Clustering
Time-series clustering is used to find out similar patterns which occur in a time-series data. Time-series sequences are characterized by many features. The trend and seasonality, for instance, are the two imp...
-
Chapter
Energy-Efficient Resource Allocation in Data Centers Using a Hybrid Evolutionary Algorithm
Energy efficient scheduling in a cloud data center aims at effectively utilizing available resources and improving the energy utilization. Resource scheduling is NP-hard and often requires substantial computat...
-
Article
SELCLOUD: a hybrid multi-criteria decision-making model for selection of cloud services
With the growing demand and commercial availability of cloud services, the need for comparison of their functionality against different prices and performance has arisen. A relevant and fair comparison is stil...
-
Article
Energy-aware virtual machine allocation and selection in cloud data centers
Data centers evolve constantly in size, complexity, and power consumption. Energy management in cloud data centers is a critical and challenging research issue. It becomes necessary to minimize the operational...
-
Reference Work Entry In depth
Legal Implications of Social Networks
-
Chapter and Conference Paper
Modeling and Analyzing Multistage Attacks Using Recursive Composition Algebra
This paper proposes a multistage attack modeling technique based on the recursive composition algebra ( \(RCA_{MA}\) ...
-
Article
Evaluating the efficiency of cloud services using modified data envelopment analysis and modified super-efficiency data envelopment analysis
Several cloud services with comparable functionality are now available to customers at different prices and performance levels. Often, there may be trade-offs among different functional and non-functional requ...
-
Living Reference Work Entry In depth
Legal Implications of Social Networks
-
Chapter and Conference Paper
Architectural Characterization of Web Service Interaction Verification
Web service interaction utilizes disparate models as it still does not have its own model for verification process. Adaptation of a different model is not always beneficial as it may prune several significant ...
-
Chapter and Conference Paper
QoS-Aware Web Service Composition Using Quantum Inspired Particle Swarm Optimization
Quality of Service (QoS)-aware web service composition is one of the challenging problems in service oriented computing. Due to the seamless proliferation of web services, it is difficult to find an optimal we...
-
Chapter and Conference Paper
Secure Sharing of Data in Cloud Computing
Cloud computing is emerging as an increasingly popular computing paradigm. Sharing of data in the cloud environments raises the issues of confidentiality, integrity, and availability. In this paper, we propose...
-
Chapter and Conference Paper
Fitness Metrics for QoS-Aware Web Service Composition Using Metaheuristics
Quality of Service (QoS)-aware composition of web services is significant field of research, moving towards heuristic solutions based on soft computing techniques. However, the existing solution are specific t...
-
Reference Work Entry In depth
Legal Implications of Social Networks