Skip to main content

previous disabled Page of 153
and
  1. No Access

    Article

    Packet header-based reweight-long short term memory (Rew-LSTM) method for encrypted network traffic classification

    With the development of Internet technology, cyberspace security has become a research hotspot. Network traffic classification is closely related to cyberspace security. In this paper, the problem of classific...

    Jiangang Hou, **n Li, Hongji Xu, Chun Wang, Lizhen Cui, Zhi Liu, Changzhen Hu in Computing (2024)

  2. No Access

    Article

    AI enabled: a novel IoT-based fake currency detection using millimeter wave (mmWave) sensor

    In recent years, the significance of millimeter wave sensors has achieved a paramount role, especially in the non-invasive and ubiquitous analysis of various materials and objects. This paper introduces a nove...

    Fahim Niaz, Jian Zhang, Muhammad Khalid, Kashif Naseer Qureshi, Yang Zheng in Computing (2024)

  3. No Access

    Article

    Integrating online partial pair programming and socially shared metacognitive regulation for the improvement of students’ learning

    Many universities around the world were forced to lock down and students had to continue their learning in online environments in response to the COVID-19 pandemic. Teachers thus had to adopt effective and app...

    Chia-Wen Tsai, Michael Yu-Ching Lin in Universal Access in the Information Society (2024)

  4. No Access

    Article

    Unraveling human social behavior motivations via inverse reinforcement learning-based link prediction

    Link prediction aims to capture the evolution of network structure, especially in real social networks, which is conducive to friend recommendations, human contact trajectory simulation, and more. However, the...

    **n Jiang, Hongbo Liu, Li** Yang, Bo Zhang, Tomas E. Ward, Václav Snášel in Computing (2024)

  5. Article

    Open Access

    MTG_CD: Multi-scale learnable transformation graph for fault classification and diagnosis in microservices

    The rapid advancement of microservice architecture in the cloud has led to the necessity of effectively detecting, classifying, and diagnosing run failures in microservice applications. Due to the high dynamic...

    Juan Chen, Rui Zhang, Peng Chen, Jianhua Ren, Zongling Wu in Journal of Cloud Computing (2024)

  6. Article

    Open Access

    Reducing the wrap** effect of set computation via Delaunay triangulation for guaranteed state estimation of nonlinear discrete-time systems

    Set computation methods have been widely used to compute reachable sets, design invariant sets and estimate system state for dynamic systems. The wrap** effect of such set computation methods plays an essent...

    Jian Wan, Luc Jaulin in Computing (2024)

  7. No Access

    Article

    SVFLDetector: a decentralized client detection method for Byzantine problem in vertical federated learning

    In recent years, with the deepening of cross-industry cooperation, vertical federated learning with multiple overlap** samples and fewer overlap** features has attracted extensive attention. Vertical feder...

    Jiuyun Xu, Yinyue Jiang, Hanfei Fan, Qiqi Wang in Computing (2024)

  8. Article

    Open Access

    Online dynamic multi-user computation offloading and resource allocation for HAP-assisted MEC: an energy efficient approach

    Nowadays, the paradigm of mobile computing is evolving from a centralized cloud model towards Mobile Edge Computing (MEC). In regions without ground communication infrastructure, incorporating aerial edge comp...

    Sihan Chen, Wanchun Jiang in Journal of Cloud Computing (2024)

  9. Article

    Open Access

    Predicting UPDRS in Parkinson’s disease using ensembles of self-organizing map and neuro-fuzzy

    Parkinson's Disease (PD) is a complex, degenerative disease that affects nerve cells that are responsible for body movement. Artificial Intelligence (AI) algorithms are widely used to diagnose and track the pr...

    Siren Zhao, Jilun Zhang, Jianbin Zhang in Journal of Cloud Computing (2024)

  10. Article

    Open Access

    Time-aware outlier detection in health physique monitoring in edge-aided sport education decision-makings

    The increasing popularity of various intelligent sensor and mobile communication technologies has enabled quick health physique sensing, monitoring, collection and analyses of students, which significantly pro...

    Yanjie Li, Liqin Kang, Zhao** Li, Fugao Jiang, Nan Bi in Journal of Cloud Computing (2024)

  11. Article

    Open Access

    SRA-E-ABCO: terminal task offloading for cloud-edge-end environments

    The rapid development of the Internet technology along with the emergence of intelligent applications has put forward higher requirements for task offloading. In Cloud-Edge-End (CEE) environments, offloading c...

    Shun Jiao, Haiyan Wang, Jian Luo in Journal of Cloud Computing (2024)

  12. Article

    Integrating online meta-cognitive learning strategy and team regulation to develop students’ programming skills, academic motivation, and refusal self-efficacy of Internet use in a cloud classroom

    With the development of technology and demand for online courses, there have been considerable quantities of online, blended, or flipped courses designed and provided. However, in the technology-enhanced learn...

    Chia-Wen Tsai, Lan-Yu Lee, Yih-** Cheng in Universal Access in the Information Society (2024)

  13. No Access

    Article

    UAV-assisted wireless charging and data processing of power IoT devices

    To ensure the reliability and operational efficiency of the grid system, this paper proposes an unmanned aerial vehicle (UAV)-assisted Power Internet of Things (PIoT), which obtains real-time grid data through...

    Ting Lyu, Jianwei An, Meng Li, Feifei Liu, Haitao Xu in Computing (2024)

  14. No Access

    Article

    Influence maximization in social networks based on discrete harris hawks optimization algorithm

    Influence Maximization (IM) is an important topic in the field of social network analysis, and is widely used in viral marketing, recommendation systems, rumor prevention and other fields. The meta-heuristic m...

    Chencheng Fan, Zhixiao Wang, Jian Zhang, Jiayu Zhao, **aobin Rui in Computing (2024)

  15. No Access

    Article

    Dynamic game based task offloading and resource pricing in LEO-multi-access edge computing

    Driven by the demand for ubiquitous connection in the Internet of everything era, this paper introduces a new low earth orbit (LEO) satellite-based multi-access edge computing fusion architecture. The architec...

    Haoyu Wang, Jianwei An in Computing (2024)

  16. No Access

    Article

    High-performance microservice differentiated domain communication technology

    Microservice architecture splits the traditional monolithic application into different small services. Differences in programming language and data structure make communication between each service difficult, ...

    Lei Zhang, Ke Pang, Jiangtao Xu in Computing (2024)

  17. Article

    Open Access

    The key security management scheme of cloud storage based on blockchain and digital twins

    As a secure distributed ledger technology, blockchain has attracted widespread attention from academia and industry for its decentralization, immutability, and traceability characteristics. This paper proposes...

    Jie Huang, Jiangyi Yi in Journal of Cloud Computing (2024)

  18. Article

    Open Access

    A knowledge-graph based text summarization scheme for mobile edge computing

    As the demand for edge services intensifies, text, being the most common type of data, has seen a significant expansion in data volume and an escalation in processing complexity. Furthermore, mobile edge compu...

    Zheng Yu, Songyu Wu, Jielin Jiang, Dongqing Liu in Journal of Cloud Computing (2024)

  19. Article

    Open Access

    Genetic algorithm-based secure cooperative control for high-order nonlinear multi-agent systems with unknown dynamics

    Research has recently grown on multi-agent systems (MAS) and their coordination and secure cooperative control, for example in the field of edge-cloud computing. MAS offers robustness and flexibility compared ...

    **n Wang, Dongsheng Yang, D Raveena Judie Dolly, Shuang Chen in Journal of Cloud Computing (2024)

  20. Article

    Open Access

    Intelligent urbanism with artificial intelligence in sha** tomorrow’s smart cities: current developments, trends, and future directions

    21st century has witnessed a profound metamorphosis in human civilization, primarily driven by the confluence of advanced network technologies and industrial modernization. This transformative period has expan...

    Zhenjun Yan, Ling Jiang, **aoli Huang, Lifang Zhang in Journal of Cloud Computing (2023)

previous disabled Page of 153