Issue 1/2023
Content (52 Articles)
Workload time series prediction in storage systems: a deep learning based approach
Li Ruan, Yu Bai, Shaoning Li, Shuibing He, Limin Xiao
A flow-based intrusion detection framework for internet of things networks
Leonel Santos, Ramiro Gonçalves, Carlos Rabadão, José Martins
Enhancing quality of experience in mobile edge computing using deep learning based data offloading and cyberattack detection technique
Anwer Mustafa Hilal, Manal Abdullah Alohali, Fahd N. Al-Wesabi, Nadhem Nemri, Hasan J. Alyamani, Deepak Gupta
An intelligent outlier detection with machine learning empowered big data analytics for mobile edge computing
Romany F. Mansour, S. Abdel-Khalek, Inès Hilali-Jaghdam, Jamel Nebhen, Woong Cho, Gyanendra Prasad Joshi
ESPINA: efficient and secured protocol for emerging IoT network applications
Alain Bertrand Bomgni, Garrik B. Jagho Mdemaya, Hafiz Munsub Ali, David Gnimpieba Zanfack, Etienne Gnimpieba Zohim
LiMPO: lightweight mobility prediction and offloading framework using machine learning for mobile edge computing
Sardar Khaliq uz Zaman, Ali Imran Jehangiri, Tahir Maqsood, Nuhman ul Haq, Arif Iqbal Umar, Junaid Shuja, Zulfiqar Ahmad, Imed Ben Dhaou, Mohammed F. Alsharekh
Smart sentiment analysis system for pain detection using cutting edge techniques in a smart healthcare framework
Anay Ghosh, Saiyed Umer, Muhammad Khurram Khan, Ranjeet Kumar Rout, Bibhas Chandra Dhara
Blockchain-based incentive management framework for desktop clouds
Abdullah Yousafzai, Priyan Malarvizhi Kumar, Choong Seon Hong
Video transcoding at the edge: cost and feasibility perspective
Syed Muhammad Ammar Hassan Bukhari, Kashif Bilal, Aiman Erbad, Amr Mohamed, Mohsen Guizani
Floating Fog: extending fog computing to vast waters for aerial users
Najmul Hassan, Mohammad Aazam, Mohammad Tahir, Kok-Lim Alvin Yau
Blockchain for deep learning: review and open challenges
Muhammad Shafay, Raja Wasim Ahmad, Khaled Salah, Ibrar Yaqoob, Raja Jayaraman, Mohammed Omar
Communication and aging aware application mapping for multicore based edge computing servers
Javid Ali, Tahir Maqsood, Naima Khalid, Sajjad A. Madani
Zone of trust: blockchain assisted IoT authentication to support cross-communication between bubbles of trusted IoTs
Aqsa Rashid, Asif Masood, Atta ur Rehman Khan
Deep reinforcement learning approach towards a smart parking architecture
Kamran Sattar Awaisi, Assad Abbas, Hasan Ali Khattak, Arsalan Ahmad, Mazhar Ali, Abbas Khalid
CoPUP: content popularity and user preferences aware content caching framework in mobile edge computing
Muhammad Yasir, Sardar Khaliq uz Zaman, Tahir Maqsood, Faisal Rehman, Saad Mustafa
A secure and flexible edge computing scheme for AI-driven industrial IoT
Yan Zhao, Ning Hu, Yue Zhao, Zhihan Zhu
A security evaluation model for multi-source heterogeneous systems based on IOT and edge computing
Ziyu Guo, Yueming Lu, Huiping Tian, Jinxin Zuo, Hui Lu
TOS-LRPLM: a task value-aware offloading scheme in IoT edge computing system
Jiayu Sun, Huiqiang Wang, Guangsheng Feng, Hongwu Lv, Jingyao Liu, Zihan Gao
A task offloading algorithm for cloud-edge collaborative system based on Lyapunov optimization
Jixun Gao, Rui Chang, Zhipeng Yang, Quanzheng Huang, Yuanyuan Zhao, Yu Wu
An empirical analysis of image augmentation against model inversion attack in federated learning
Seunghyeon Shin, Mallika Boyapati, Kun Suo, Kyungtae Kang, Junggab Son
DMAIDPS: a distributed multi-agent intrusion detection and prevention system for cloud IoT environments
Amir Javadpour, Pedro Pinto, Forough Ja’fari, Weizhe Zhang
A feature-based processing framework for real-time implementation of muscle fatigue measurement
P. González-Zamora, Victor H. Benitez, Jesus Pacheco
A review of smart contract-based platforms, applications, and challenges
Pratima Sharma, Rajni Jindal, Malaya Dutta Borah
SFCSim: a network function virtualization resource allocation simulation platform
Lingyi Xu, Hefei Hu, Yuanan Liu
Automatic delay-sensitive applications quality of service improvement with deep flows discrimination in software defined networks
Ramin Mohammadi, Sedat Akleylek, Ali Ghaffari, Alireza Shirmarz
Mapping and embedding infrastructure resource management in software defined networks
Amir Javadpour, Forough Ja’fari, Pedro Pinto, Weizhe Zhang
Detection and prediction of traffic accidents using deep learning techniques
Anique Azhar, Saddaf Rubab, Malik M. Khan, Yawar Abbas Bangash, Mohammad Dahman Alshehri, Fizza Illahi, Ali Kashif Bashir
High-performance pseudo-anonymization of virtual power plant data on a CPU cluster
Mahdi Abbasi, Azam Fazel Najafabadi, Seifeddine Ben Elghali, Mohamed Zerrougui, Mohammad R. Khosravi, Habib Nasser
Correction to: High-performance pseudo-anonymization of virtual power plant data on a CPU cluster
Mahdi Abbasi, Azam Fazel Najafabadi, Seifeddine Ben Elghali, Mohamed Zerrougui, Mohammad R. Khosravi, Habib Nasser
PI-sqrt: novel parallel implementations of in-place sequence rotation on multicore systems
Mervat Hashem, Kenli Li, Ahmad Salah
A highly secured intrusion detection system for IoT using EXPSO-STFA feature selection for LAANN to detect attacks
M. Jeyaselvi, Rajesh Kumar Dhanaraj, M. Sathya, Fida Hussain Memon, Lalitha Krishnasamy, Kapal Dev, Wang Ziyue, Nawab Muhammad Faseeh Qureshi
Design of cultural emperor penguin optimizer for energy-efficient resource scheduling in green cloud computing environment
Romany F. Mansour, Hesham Alhumyani, Sayed Abdel Khalek, Rashid A. Saeed, Deepak Gupta
Energy efficient offloading mechanism using particle swarm optimization in 5G enabled edge nodes
Nebojsa Bacanin, Milos Antonijevic, Timea Bezdan, Miodrag Zivkovic, K. Venkatachalam, Sharaf Malebary
A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things
Arun Kumar Sangaiah, Amir Javadpour, Forough Ja’fari, Pedro Pinto, Weizhe Zhang, Sudha Balasubramanian
Knowledge defined networks on the edge for service function chaining and reactive traffic steering
Adeel Rafiq, Saad Rehman, Rupert Young, Wang-Cheol Song, Muhammad Attique Khan, Seifedine Kadry, Gautam Srivastava
Joint resource trading and computation offloading in blockchain enhanced D2D-assisted mobile edge computing
Weipeng Jing, Xinyu Fu, Peng Liu, HouBing Song
MECpVmS: an SLA aware energy-efficient virtual machine selection policy for green cloud computing
Riman Mandal, Manash Kumar Mondal, Sourav Banerjee, Gautam Srivastava, Waleed Alnumay, Uttam Ghosh, Utpal Biswas
Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter
Mengyao Li, Rongbo Zhu, Qianao Ding, Jun Wang, Shaohua Wan, Maode Ma
Design and realization of a secure multiplicative homomorphic encryption scheme for cloud services
Christiana Zaraket, Khalil Hariss, Sandro Ephrem, Maroun Chamoun, Tony Nicolas
A new method of content distribution based on fuzzy logic and coalition graph games for VEC
De-gan Zhang, Hao-li Zhu, Ting Zhang, Jie Zhang, Jin-yu Du, Guo-qiang Mao
Modeling and simulation of smart grid-aware edge computing federations
Román Cárdenas, Patricia Arroba, José L. Risco-Martín, José M. Moya
Task processing optimization using cuckoo particle swarm (CPS) algorithm in cloud computing infrastructure
Hadi Zavieh, Amir Javadpour, Yuan Li, Forough Ja’fari, Seyed Hadi Nasseri, Ali Shokouhi Rostami
Enhancing vehicular edge computing system through cooperative computation offloading
Yanfei Lu, Dengyu Han, Xiaoxuan Wang, Qinghe Gao
Energy efficient offloading scheme for MEC-based augmented reality system
Abdelhamied A. Ateya, Ammar Muthanna, Andrey Koucheryavy, Yassine Maleh, Ahmed A. Abd El-Latif
A classification-based sensor data processing method for the internet of things assimilated wearable sensor technology
Manas Ranjan Pradhan, Beenu Mago, Karamath Ateeq
Password authentication key exchange based on key consensus for IoT security
Zongqu Zhao, Shaoti Ma, Panke Qin
Static to dynamic transition of RPL protocol from IoT to IoV in static and mobile environments
Sakshi Garg, Deepti Mehrotra, Hari Mohan Pandey, Sujata Pandey
Correction: Static to dynamic transition of RPL protocol from IoT to IoV in static and mobile environments
Sakshi Garg, Deepti Mehrotra, Hari Mohan Pandey, Sujata Pandey