![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
3,042 Result(s)
-
Article
Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification
With the development of Internet technology, cyberspace security has become a research hotspot. Network traffic classification is closely related to cyberspace security. In this paper, the problem of classific...
-
Article
AI enabled: a novel IoT-based fake currency detection using millimeter wave (mmWave) sensor
In recent years, the significance of millimeter wave sensors has achieved a paramount role, especially in the non-invasive and ubiquitous analysis of various materials and objects. This paper introduces a nove...
-
Article
Integrating online partial pair programming and socially shared metacognitive regulation for the improvement of students’ learning
Many universities around the world were forced to lock down and students had to continue their learning in online environments in response to the COVID-19 pandemic. Teachers thus had to adopt effective and app...
-
Article
Unraveling human social behavior motivations via inverse reinforcement learning-based link prediction
Link prediction aims to capture the evolution of network structure, especially in real social networks, which is conducive to friend recommendations, human contact trajectory simulation, and more. However, the...
-
Article
Open AccessMTG_CD: Multi-scale learnable transformation graph for fault classification and diagnosis in microservices
The rapid advancement of microservice architecture in the cloud has led to the necessity of effectively detecting, classifying, and diagnosing run failures in microservice applications. Due to the high dynamic...
-
Article
Open AccessReducing the wrap** effect of set computation via Delaunay triangulation for guaranteed state estimation of nonlinear discrete-time systems
Set computation methods have been widely used to compute reachable sets, design invariant sets and estimate system state for dynamic systems. The wrap** effect of such set computation methods plays an essent...
-
Article
SVFLDetector: a decentralized client detection method for Byzantine problem in vertical federated learning
In recent years, with the deepening of cross-industry cooperation, vertical federated learning with multiple overlap** samples and fewer overlap** features has attracted extensive attention. Vertical feder...
-
Article
Open AccessOnline dynamic multi-user computation offloading and resource allocation for HAP-assisted MEC: an energy efficient approach
Nowadays, the paradigm of mobile computing is evolving from a centralized cloud model towards Mobile Edge Computing (MEC). In regions without ground communication infrastructure, incorporating aerial edge comp...
-
Article
Open AccessPredicting UPDRS in Parkinson’s disease using ensembles of self-organizing map and neuro-fuzzy
Parkinson's Disease (PD) is a complex, degenerative disease that affects nerve cells that are responsible for body movement. Artificial Intelligence (AI) algorithms are widely used to diagnose and track the pr...
-
Article
Open AccessTime-aware outlier detection in health physique monitoring in edge-aided sport education decision-makings
The increasing popularity of various intelligent sensor and mobile communication technologies has enabled quick health physique sensing, monitoring, collection and analyses of students, which significantly pro...
-
Article
Open AccessSRA-E-ABCO: terminal task offloading for cloud-edge-end environments
The rapid development of the Internet technology along with the emergence of intelligent applications has put forward higher requirements for task offloading. In Cloud-Edge-End (CEE) environments, offloading c...
-
Article
Integrating online meta-cognitive learning strategy and team regulation to develop students’ programming skills, academic motivation, and refusal self-efficacy of Internet use in a cloud classroom
With the development of technology and demand for online courses, there have been considerable quantities of online, blended, or flipped courses designed and provided. However, in the technology-enhanced learn...
-
Article
UAV-assisted wireless charging and data processing of power IoT devices
To ensure the reliability and operational efficiency of the grid system, this paper proposes an unmanned aerial vehicle (UAV)-assisted Power Internet of Things (PIoT), which obtains real-time grid data through...
-
Article
Influence maximization in social networks based on discrete harris hawks optimization algorithm
Influence Maximization (IM) is an important topic in the field of social network analysis, and is widely used in viral marketing, recommendation systems, rumor prevention and other fields. The meta-heuristic m...
-
Article
Dynamic game based task offloading and resource pricing in LEO-multi-access edge computing
Driven by the demand for ubiquitous connection in the Internet of everything era, this paper introduces a new low earth orbit (LEO) satellite-based multi-access edge computing fusion architecture. The architec...
-
Article
High-performance microservice differentiated domain communication technology
Microservice architecture splits the traditional monolithic application into different small services. Differences in programming language and data structure make communication between each service difficult, ...
-
Article
Open AccessThe key security management scheme of cloud storage based on blockchain and digital twins
As a secure distributed ledger technology, blockchain has attracted widespread attention from academia and industry for its decentralization, immutability, and traceability characteristics. This paper proposes...
-
Article
Open AccessA knowledge-graph based text summarization scheme for mobile edge computing
As the demand for edge services intensifies, text, being the most common type of data, has seen a significant expansion in data volume and an escalation in processing complexity. Furthermore, mobile edge compu...
-
Article
Open AccessGenetic algorithm-based secure cooperative control for high-order nonlinear multi-agent systems with unknown dynamics
Research has recently grown on multi-agent systems (MAS) and their coordination and secure cooperative control, for example in the field of edge-cloud computing. MAS offers robustness and flexibility compared ...
-
Article
Open AccessIntelligent urbanism with artificial intelligence in sha** tomorrow’s smart cities: current developments, trends, and future directions
21st century has witnessed a profound metamorphosis in human civilization, primarily driven by the confluence of advanced network technologies and industrial modernization. This transformative period has expan...