Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 27, Issue 1Feb 2024
Publisher:
  • Kluwer Academic Publishers
  • 101 Philip Drive Assinippi Park Norwell, MA
  • United States
ISSN:1386-7857
Reflects downloads up to 25 Jan 2025Bibliometrics
review-article
Foundation and large language models: fundamentals, challenges, opportunities, and social impacts
Abstract

Foundation and Large Language Models (FLLMs) are models that are trained using a massive amount of data with the intent to perform a variety of downstream tasks. FLLMs are very promising drivers for different domains, such as Natural Language ...

research-article
Security provisions in smart edge computing devices using blockchain and machine learning algorithms: a novel approach
Abstract

It is difficult to manage massive amounts of data in an overlying environment with a single server. Therefore, it is necessary to comprehend the security provisions for erratic data in a dynamic environment. The authors are concerned about the ...

research-article
A hybridized approach for minimizing energy in cloud computing
Abstract

Traditional scheduling techniques are designed to reduce processing times while disregarding energy costs. One way of lowering energy usage is to implement scheduling strategies that distribute tasks to specified resources, which influence the ...

research-article
Artificial neural networks based predictions towards the auto-tuning and optimization of parallel IO bandwidth in HPC system
Abstract

Super-computing or HPC clusters are built to provide services to execute computationally complex applications. Generally, these HPC applications involve large scale IO (input/output) processing over the networked parallel file system disks. They ...

research-article
GHB: a cost-effective and energy-efficient data center network structure with greater incremental scalability
Abstract

Designing a cost-effective, energy-efficient and highly scalable network for data centers that can deliver sufficient bandwidth has drawn tremendous attentions recently. The data center networks constructed by using multi-port servers can provide ...

research-article
Machine learning based file type classifier designing in IoT cloud
Abstract

With the increase interest and number of the users in Social media, the file handling has also increased. To manage the load, cloud servers are being used by the service providers. To identify and cluster file is a difficult task that is important ...

research-article
Multi-input cloud resource allocation strategy with limited buffer and virtual machine synchronization failure
Abstract

Based on virtualization technologies, virtual machines (VMs) provide computing services and network resources for cloud users over the Internet. When cloud users use VMs for an extended period of time, requests generated by other cloud users are ...

research-article
SRG: a clustering algorithm based on scale division and region growing
Abstract

Clustering is an important technique for data mining and machine learning. In this paper, a novel clustering algorithm, scale division and region growing (SRG), is proposed, which is based on scale division and region growing. This method uses the ...

research-article
Heuristic algorithm for task mapping problem in a hierarchical wireless network-on-chip architecture
Abstract

Given the complexity and wide range of applications being developed for the Internet of Things (IoT) requiring an efficient mapping of application tasks in hardware resources, especially embedded systems, it is necessary to address the problem of ...

research-article
Single-tag and multi-tag RFID data cleaning approach in edge computing
Abstract

As the performance of Radio Frequency Identification (RFID) devices is susceptible to the influence of the surrounding environment, making the original data collected by RFID devices with uncertain, of which missed data and redundant data are the ...

research-article
Application placement in fog-cum-cloud environment based on a low latency policy-making framework
Abstract

Today, Fog computing plays an important role in minimizing service delivery delays and network relaxation. So many architectures with different purposes are presented in the Fog environment. One of the major drawbacks of most of these ...

research-article
Bi-level optimization of resource allocation and appliance scheduling in residential areas using a Fog of Things (FOT) framework
Abstract

Fog computing has become a state-of-art technology for cloud applications in collaboration with physical IOT devices on the edge of the network.We propose a Fog of Things (FOT) framework for optimized resource allocation to manage issues of over ...

research-article
Hybrid enhanced whale optimization algorithm for contrast and detail enhancement of color images
Abstract

Image enhancement is an essential step in image analysis and processing as it helps people to recognize and understand images because their perception is greatly influenced by image quality. Incomplete beta function (IBF) is a broadly employed ...

research-article
When blockchain meets IoT: a comparison of the performance of communication protocols in a decentralized identity solution for IoT using blockchain
Abstract

Internet of Things (IoT) is a rapidly expanding technology composed of devices embedded with sensors, specialized hardware, and software to connect with other devices and servers on the internet. With this rapid expansion, it faces some major ...

research-article
Quantum-resistant public-key encryption and signature schemes with smaller key sizes
Abstract

The emergence of new complex technologies, such as cloud and quantum computing, has a complicated computational structure, which can compromise the security of traditional cryptographic protocols. It has been noted that traditional security ...

research-article
Machine learning regression-based RETRO-VLP for real-time and stabilized indoor positioning
Abstract

Many real-world applications require real-time and robust positioning of Internet of Things (IoT) devices. In this context, visible light communication (VLC) is a promising approach due to its advantages in terms of high accuracy, low cost, ...

research-article
Robust Federated Learning for execution time-based device model identification under label-flipping attack
Abstract

The computing device deployment explosion experienced in recent years, motivated by the advances of technologies such as Internet-of-Things (IoT) and 5G, has led to a global scenario with increasing cybersecurity risks and threats. Among them, ...

research-article
BERT-based ensemble learning for multi-aspect hate speech detection
Abstract

The social media world nowadays is overwhelmed with unfiltered content ranging from cyberbullying and cyberstalking to hate speech. Therefore, identifying and cleaning up such toxic language presents a big challenge and an active area of research. ...

research-article
Security prioritized multiple workflow allocation model under precedence constraints in cloud computing environment
Abstract

In the last decade, cloud computing has become an effective and efficient service delivery platform to offer resources, innovation, and economies of scale on telecommunication networks. An allocation scheme without security constraints ...

research-article
CBLA_PM: an improved ann-based power consumption prediction algorithm for multi-type jobs on heterogeneous computing server
Abstract

Numerous data centers have adopted heterogeneous computing server to accelerate the processing speed with various applications. However, as the growth of efficiency, the issue of high power consumption is increasingly becoming crucial. Traditional ...

research-article
Harris Hawks optimization based hybrid deep learning model for efficient network slicing in 5G network
Abstract

Newly devised fifth-generation (5G) and sixth-generation (6G) networks next-generation networks are extremely secure, low latency, dependable, and versatile. These next-generation networks differ from traditional networks (1G to 4G). As these ...

research-article
Banyan tree growth optimization and application
Abstract

In the era of big data, the number of science and technology service resources has proliferated, and the integration and clustering of science and technology documents become a challenging issue. This paper proposes a novel meta-heuristic ...

research-article
Deep learning-based user experience evaluation in distance learning
Abstract

The Covid-19 pandemic caused uncertainties in many different organizations, institutions gained experience in remote working and showed that high-quality distance education is a crucial component in higher education. The main concern in higher ...

research-article
File block multi-replica management technology in cloud storage
Abstract

With the rapid development of cloud computing technology and the broad application of the Internet, more and more user data are stored in the cloud storage system online. Data copy technology is an effective technical means to manage various data ...

research-article
An access control model based on blockchain master-sidechain collaboration
Abstract

The centralized storage and centralized authorization approach in medical information systems can lead to data tampering and private information privacy leakage, while the traditional access control model has an overly simple authentication ...

research-article
CAC-WOA: context aware clustering with whale optimization algorithm for knowledge discovery from multidimensional space in electricity application
Abstract

Energy consumption forecasting is a hot field of research; despite the number of developed models, projecting electric consumption in residential buildings remains problematic owing to the significant unpredictability of occupant energy use ...

research-article
Optimization of large-scale UAV cluster confrontation game based on integrated evolution strategy
Abstract

The development of large-scale cluster intelligence will inevitably lead to new problems of adversarial game control. Aiming at the problem of high dimension and high dynamics in the process of unmanned aerial vehicle (UAV) cluster confrontation ...

research-article
Appropriate number of analogues in analogy based software effort estimation using quality datasets
Abstract

Analogy-based software effort estimation (ASEE) plays an important role in software development. It attracts the attention of researchers nowadays due to the simplicity of the ASEE reasoning method. ASEE reasoning is considered simple because it ...

research-article
COVID-19 CT-images diagnosis and severity assessment using machine learning algorithm
Abstract

As a pandemic, the primary evaluation tool for coronavirus (COVID-19) still has serious flaws. To improve the existing situation, all facilities and tools available in this field should be used to combat the pandemic. Reverse transcription ...

research-article
An extended lightweight blockchain based collaborative healthcare system for fraud prevention
Abstract

Multiple benefits (submitting healthcare bills to one or more organizations) and data breaches (tampering of healthcare data by healthcare organization authorities) are typical frauds happening due to the centralization of authority in healthcare ...

Comments