Blockchain technology for society 4.0: a comprehensive review of key applications, requirement analysis, research trends, challenges and future avenues
Society 4.0 brings new information technology to mass audience accompanied by economic and social developments in the 21st century. The enablers of Society 4.0 such as Blockchain, Artificial Intelligence (AI), and the Internet of Things (IoT) ...
IoT-based eHealth using blockchain technology: a survey
The eHealth sector has witnessed significant growth due to technological advancements, facilitating care delivery in patients' homes and moving away from traditional hospital settings. Blockchain and the Internet of Things (IoT) play pivotal roles ...
A systematic mapping on software testing for blockchains
The purpose of this study is to identify and classify studies published on software testing techniques applied to blockchain systems. Previously published reviews in related areas have a narrow focus and/or do not follow a systematic review ...
Quantum software engineering and quantum software development lifecycle: a survey
Quantum software engineering is advancing in the domain of quantum computing research and application, yet the documentation is scattered. The slow transition from Von-Neumann based computation systems to quantum systems, and conserving the ...
Multi-strategy boosted Aquila optimizer for function optimization and engineering design problems
As the complexity of optimization problems continues to rise, the demand for high-performance algorithms becomes increasingly urgent. This paper addresses the challenges faced by the Aquila Optimizer (AO), a novel swarm-based intelligent optimizer ...
An industrial network intrusion detection algorithm based on IGWO-GRU
The openness and interconnectedness of industrial control systems (ICSs) is increasing, leading to a heightened risk of network-based attacks. Although research on industrial intrusion detection is ongoing, current methods often overlook the ...
Reliability through an optimal SDS controller’s placement in a SDDC and smart city
Data center storage systems have different workloads and characteristics. In a centralized managed storage paradigm (software defined data center), providing a fault-tolerant system requires the best possible placement, and the least possible ...
A balanced leader election algorithm based on replica distribution in Kubernetes cluster
Kubernetes is a well-known open source project that provides a powerful orchestration platform for containerized applications. To ensure high scalability and availability of services, redundant deployment is usually adopted in Kubernetes clusters, ...
A new energy-aware technique to improve the network lifetime of wireless Internet of Things using a most valuable player algorithm
With the fast evolution of Internet of Things (IoT) applications, Wireless Sensor Networks (WSNs) have become a crucial part of modern infrastructure. The efficient provision of services and wiser use of resources are currently of great ...
CyberDefender: an integrated intelligent defense framework for digital-twin-based industrial cyber-physical systems
The rise of digital twin-based operational improvements poses a challenge to protecting industrial cyber-physical systems. It is crucial to safeguard digital twins while disclosing internals, which can create an increased attack surface. However, ...
Malicious detection model with artificial neural network in IoT-based smart farming security
The Internet of Things (IoT) tunes modern technologies, including wireless sensors and cloud computing, to create a homogeneous and highly effective environment. Therefore, IoT has emerged in various fields of life, such as healthcare, industry, ...
A real-time stable competitive auction-based task offloading market for heterogeneous mobile cloud (HMC)
In this paper we propose an auction-based offloading market in the HMC (Heterogeneous Mobile Cloud) environment where mobile devices, Cloudlets, and public cloud form a shared resource pool. In this market, users can register their service offers ...
An energy-aware module placement strategy in fog-based healthcare monitoring systems
Fog computing and the Internet of Things (IoT) have revolutionized healthcare monitoring systems, enabling real-time health data collection and transmission while overcoming cloud computing limitations. However, efficiently selecting fog nodes for ...
Maintaining the completion-time mechanism for Greening tasks scheduling on DVFS-enabled computing platforms
The key factor in reducing the consumed energy when dependent-tasks applications are scheduled on DVFS-enabled computing platforms is task execution time slots. The unique and axiomatic approach to reduce the energy consumption on such platforms ...
A secure paillier cryptosystem based privacy-preserving data aggregation and query processing models for smart grid
A smart meter is an automation technology that sends real-time power consumption of electric appliances to the outsourced cloud through the aggregator node. An outsourced cloud is used by the Utility providers to release computation and storage ...
GHA-Inst: a real-time instance segmentation model utilizing YOLO detection framework
The real-time instance segmentation task based on deep learning aims to accurately identify and distinguish all instance objects from images or videos. However, due to the existence of problems such as mutual occlusion between instances, ...
A service mesh approach to integrate processing patterns into microservices applications
Cloud is the new enabler of data processing, archiving and analyzing, wherein offered services are built with flexible and low-coupling schemes following a microservice architecture, which is commonly managed by service mesh managers. Microservice ...
A mobility-aware task scheduling by hybrid PSO and GA for mobile edge computing
Mobile edge computing (MEC) is considered one of the key technologies for large-scale network services. Task scheduling helps to improve the task completion rate of MEC, by properly mapping tasks generated by devices onto MEC resources. However, ...
Power-aware QoS-centric strategy for ultra reliable low latency communication in 5G beyond wireless networks
Ultra-Reliable Low Latency Communication (URLLC) is mostly used for core services in the fifth generation (5G) and beyond cellular networks. Due to the conflicting demands of low latency and extremely high reliability, the ongoing research on this ...
Multi-objective task offloading optimization in fog computing environment using INSCSA algorithm
The presence of limitations such as processing and energy in many of end devices has resulted in task offloading to other sources. To address these limitations, offloading can be performed in diverse environments such as fog or cloud. This article ...
Data fusion and network intrusion detection systems
The increasing frequency and sophistication of cyber-attacks pose significant threats to organizational entities and critical national infrastructure, leading to substantial financial and operational consequences. Detecting such attacks early and ...
A reliable method for data aggregation on the industrial internet of things using a hybrid optimization algorithm and density correlation degree
The Internet of Things (IoT) is a new information technology sector in which each device may receive and distribute data across a network. Industrial IoT (IIoT) and related areas, such as Industrial Wireless Networks (IWNs), big data, and cloud ...
Fusion of deep and local gradient-based features for multimodal finger knuckle print identification
This paper proposes a novel efficient descriptor for finger knuckle print (FKP) identification. Our proposed descriptor is called MDL (Magnitude, Direction, and Local patterns), as it describes the rich structure of FKP images by jointly encoding ...
Locality-aware virtual machine placement based on similarity properties in mobile edge computing
An optimized container consolidation is a key factor in Mobile Edge Computing. It is a challenging problem as its complexity is NP-hard. In addition to structural properties of a network which reveal nodes features and their connectivity, we ...
Fine-grained resource adjustment of edge server in cloud-edge collaborative environment
In the cloud-edge collaborative environment, the edge server manager will divide the physical resources based on virtualization technology, so as to deploy multiple applications on the same server. However, due to the imperfect virtualization ...
Uit-DGAdetector: detect domains generated by algorithms using machine learning
Recent developments in information technology have brought numerous benefits but have also created risks for information security. One notable threat is the domain generated by the algorithm (DGA) technique used by botnets, which allows them to ...
Task scheduling using fuzzy logic with best-fit-decreasing for cloud computing environment
An efficient task scheduling is mandatory in cloud computing for providing virtual resources used to carry out the tasks. An effective allocation of VM with the presence of diverse resource requirements, inaccurate information and uncertainties ...
Line-of-sight aware accurate collaborative localization based on joint TDoA and AoA measurements in UWB-MIMO environment
Ultra wide band (UWB) based localization has been extensively utilized in indoor and urban dense regions which enables centimeter-level localization accuracy over global positioning system (GPS). However, the prior UWB-based localization methods ...
Energy-delay-aware VNF scheduling: a reinforcement learning approach with hierarchical reward enhancement
Network functions virtualization (NFV) is a technology that virtualizes network functions into virtual network functions (VNF) to deliver communication services. Efficient and flexible VNF scheduling is an important way to improve network resource ...
Analyzing the impact of various parameters on job scheduling in the Google cluster dataset
Cloud architecture and its operations interest both general consumers and researchers. Google, as a technology giant, offers cloud services globally. This paper analyzes the Google cluster usage trace, focusing on three key aspects: task execution ...