Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 15 Oct 2024Bibliometrics
research-article
Adversarial Attacks on Visual Objects Using the Fast Gradient Sign Method
Abstract

Adversarial attacks exploit vulnerabilities or weaknesses in the model’s decision-making process to generate inputs that appear benign to humans but can lead to incorrect or unintended outputs from the model. Neural networks (NNs) are widely used ...

research-article
Mayfly Taylor Optimization-Based Graph Attention Network for Task Scheduling in Edge Computing
Abstract

Multi-access edge computing (MEC) is a technology that enables devices with limited processing capabilities to handle computationally intensive tasks efficiently. The challenge with MEC is how to schedule multiple tasks rationally and efficiently, ...

research-article
ICSMPC: Design of an Iterative-Learning Contextual Side Chaining Model for Improving Security of Priority-Aware Cloud Resources
Abstract

Purpose: A wide variety of encryption-based, key-exchange-based, privacy-based, and confidentiality-based models are proposed by researchers, which assist in enhancing security performance under real-time attacks. But most of these models are ...

research-article
Multi-Population Cooperative Elite Algorithm for Efficient Computation Offloading in Mobile Edge Computing
Abstract

The Internet of Things (IoT) and mobile edge computing (MEC) technologies advance, more workloads are being transferred to edge servers for processing. The offloading strategy is a crucial aspect of this development, considering all relevant ...

research-article
Honeypot Based Industrial Threat Detection Using Game Theory in Cyber-Physical System
Abstract

Cyber threats are clearly understood across the security landscape using honeypot technologies across industrial cyber-physical systems (ICPS). Specifically, Distributed Denial of Service (DDoS) and Man in the Middle (MITM) attacks are the ...

research-article
MapReduce with Deep Learning Framework for Student Health Monitoring System using IoT Technology for Big Data
Abstract

The efficient well-being and health interventions of students are ensured by better knowledge of student’s health and fitness factors. Effective Health Monitoring (HM) systems are introduced by using the Internet of Things (IoT) technology and ...

research-article
BlockFaaS: Blockchain-enabled Serverless Computing Framework for AI-driven IoT Healthcare Applications
Abstract

With the development of new sensor technologies, Internet of Things (IoT)-based healthcare applications have gained momentum in recent years. However, IoT devices have limited resources, making them incapable of executing large computational ...

research-article
H-Storm: A Hybrid CPU-FPGA Architecture to Accelerate Apache Storm
Abstract

The era of big data has led to the exponential growth of the amount of real-time data. Nowadays, traditional centralized solutions and parallelism techniques in distributed systems cannot satisfy the processing requirements of emerging ...

research-article
An Intelligent Blockchain-based Secure Link Failure Recovery Framework for Software-defined Internet-of-Things
Abstract

The frequency of link failures in Internet-of-Things (IoT) network are more than the node failures. Hence, effective link recovery schemes are required for a seamless communication in the IoT. In contrast to traditional networking, the IoT is ...

research-article
AI and Blockchain Assisted Framework for Offloading and Resource Allocation in Fog Computing
Abstract

The role of Internet of Things (IoT) applications has increased tremendously in several areas like healthcare, agriculture, academia, industries, transportation, smart cities, etc. to make human life better. The number of IoT devices is increasing ...

research-article
Novel Edge Computing-Based Privacy-Preserving Approach for Smart Healthcare Systems in the Internet of Medical Things
Abstract

This paper presents the Edge-Based Privacy Preserving Approach (EBPPA) for healthcare applications that store private user data on cloud servers, and perform computation operations for patient diagnoses. The increasing cyber-attacks on hospital ...

research-article
Computing Resources Scalability Performance Analysis in Cloud Computing Data Center
Abstract

Today, cloud computing has become an essential technology in modern times, offering a wide range of benefits to organizations of all sizes. It provides access to computing resources on-demand over the internet, reducing costs and enabling ...

research-article
Image Fuzzy Edge Information Segmentation Based on Computer Vision and Machine Learning
Abstract

Image segmentation is a key problem in the field of machine vision. Its core goal is to separate the target and background in the region of interest from the image and directly affect the accuracy of subsequent operations such as target ...

research-article
Modeling Distributed and Configurable Hierarchical Blockchain over SDN and Fog-Based Networks for Large-Scale Internet of Things
Abstract

With an emphasis on the role of automation in Industry 4.0, there has been widespread growth in the adoption of industrial Internet of Things (IoT). However, as IoT networks become larger with billions of heterogeneous devices, scalability and ...

research-article
Preservation of Sensitive Data Using Multi-Level Blockchain-based Secured Framework for Edge Network Devices
Abstract

The proliferation of IoT devices has influenced end users in several aspects. Yottabytes (YB) of information are being produced in the IoT environs because of the ever-increasing utilization capacity of the Internet. Since sensitive information, ...

research-article
A Real-Time Partition Generation Mechanism for Data Skew Mitigation in Spark Computing Environment
Abstract

Due to the limitation of the computing power of a single node, big data is usually processed on a distributed parallel processing framework. The data in the real scene is usually not evenly distributed. Data skew will seriously affect the ...

research-article
A Multi-joint Optimisation Method for Distributed Edge Computing Resources in IoT-Based Smart Cities
Abstract

Smart cities can handle numerous IoT devices with enhanced services that offer intelligent and effective answers to different elements of urban life. Smart cities use the Internet of Things (IoT). Even as the amount of Internet of Things (IoT) ...

research-article
A Novel Approach to Cloud Resource Management: Hybrid Machine Learning and Task Scheduling
Abstract

Cloud enterprises are currently facing difficulties managing the enormous amount of data and varied resources in the cloud because of the explosive expansion of the cloud computing system with numerous clients, ranging from small business owners ...

research-article
Anti-Attack Intrusion Detection Model Based on MPNN and Traffic Spatiotemporal Characteristics
Abstract

Considering the robustness and accuracy of conventional intrusion detection models are easily influenced by adversarial attacks, this work proposes an anti-attack intrusion detection model based on a message-passing neural network with traffic ...

research-article
Sustainable Environmental Design Using Green IOT with Hybrid Deep Learning and Building Algorithm for Smart City
Abstract

Smart cities and urbanization use enormous IoT devices to transfer data for analysis and information processing. These IoT can relate to billions of devices and transfer essential data from their surroundings. There is a massive need for energy ...

research-article
Hybrid Immune Whale Differential Evolution Optimization (HIWDEO) Based Computation Offloading in MEC for IoT
Abstract

The adoption of User Equipment (UE) is on the rise, driven by advancements in Mobile Cloud Computing (MCC), Mobile Edge Computing (MEC), the Internet of Things (IoT), and Artificial Intelligence (AI). Among these, MEC stands out as a pivotal ...

research-article
Secured SDN Based Task Scheduling in Edge Computing for Smart City Health Monitoring Operation Management System
Abstract

Health monitoring systems (HMS) with wearable IoT devices are constantly being developed and improved. But most of these gadgets have limited energy and processing power due to resource constraints. Mobile edge computing (MEC) must be used to ...

research-article
Deep Reinforcement Learning and Markov Decision Problem for Task Offloading in Mobile Edge Computing
Abstract

Mobile Edge Computing (MEC) offers cloud-like capabilities to mobile users, making it an up-and-coming method for advancing the Internet of Things (IoT). However, current approaches are limited by various factors such as network latency, bandwidth,...

research-article
Smart Financial Investor’s Risk Prediction System Using Mobile Edge Computing
Abstract

The financial system has reached its pinnacle because of economic and social growth, which has propelled the financial sector into another era. Public and corporate financial investment operations have significantly risen in this climate, and they ...

research-article
Efficient Prediction of Makespan Matrix Workflow Scheduling Algorithm for Heterogeneous Cloud Environments
Abstract

Leveraging a cloud computing environment for executing workflow applications offers high flexibility and strong scalability, thereby significantly improving resource utilization. Current scholarly discussions heavily focus on effectively reducing ...

research-article
Healthcare and Fitness Services: A Comprehensive Assessment of Blockchain, IoT, and Edge Computing in Smart Cities
Abstract

Edge computing, blockchain technology, and the Internet of Things have all been identified as key enablers of innovative city initiatives. A comprehensive examination of the research found that IoT, blockchain, and edge computing are now major ...

research-article
An Auto-Scaling Approach for Microservices in Cloud Computing Environments
Abstract

Recently, microservices have become a commonly-used architectural pattern for building cloud-native applications. Cloud computing provides flexibility for service providers, allowing them to remove or add resources depending on the workload of ...

research-article
Deep Learning-Based Multi-Domain Framework for End-to-End Services in 5G Networks
Abstract

Over the past few years, network slicing has emerged as a pivotal component within the realm of 5G technology. It plays a critical role in effectively delineating network services based on a myriad of performance and operational requirements, all ...

research-article
Integration of a Lightweight Customized 2D CNN Model to an Edge Computing System for Real-Time Multiple Gesture Recognition
Abstract

The human-machine interface (HMI) collects electrophysiology signals incoming from the patient and utilizes them to operate the device. However, most applications are currently in the testing phase and are typically unavailable to everyone. ...

research-article
A Bibliometric Analysis of Convergence of Artificial Intelligence and Blockchain for Edge of Things
Abstract

The convergence of Artificial Intelligence (AI) and Blockchain technologies has emerged as a powerful paradigm to address the challenges of data management, security, and privacy in the Edge of Things (EoTs) environment. This bibliometric analysis ...

Comments