Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Benchmarking and revisiting time series forecasting methods in cloud workload prediction
AbstractOver the past decades, cloud computing has become a cornerstone of modern infrastructure. Accurate cloud workload prediction is crucial for assessing quality of service and ensuring efficient resource utilization in cloud center. Despite ...
- research-articleNovember 2024
Multi-depot vehicle routing problem with drones in emergency logistics
AbstractIn order to expand the application of truck-drone cooperative delivery in emergency logistics, this paper investigates the multi-depot vehicle routing problem with drones for emergency logistics scheduling. A mixed-integer programming model with ...
- research-articleNovember 2024
Towards GPU-enabled serverless cloud edge platforms for accelerating HEVC video coding
AbstractMultimedia streaming has become integral to modern living, reshaping entertainment consumption, information access, and global engagement. The ascent of cloud computing, particularly serverless architectures, plays a pivotal role in this ...
- research-articleNovember 2024
An efficient content based image retrieval framework using separable CNNs
AbstractContent-Based Image Retrieval (CBIR) is a method for retrieving images based on their content rather than relying on textual descriptions or tags. Over the last decade, Deep Convolutional Neural Networks (D-CNN) based architectures have gained ...
- research-articleOctober 2024
Towards an enhanced next activity prediction using attention based neural networks
AbstractPredictive Business Process Monitoring has gained significant attention in recent years due to its capability to forecast process outcomes and predict the next event within an ongoing process. In the last few years, works have focused on deep ...
-
- research-articleOctober 2024
- research-articleOctober 2024
Securing supply chain through blockchain-integrated algorithmic system: ensuring product quality and counterfeiting tags detection
AbstractPoor-quality products and counterfeit tags within the supply chains pose major challenges. Although several approaches have been suggested, they do not address all the challenges. This paper proposes a blockchain-integrated supply chain to tackle ...
- research-articleOctober 2024
Aggregation-chain: a consortium blockchain based multi-chain data sharing framework with efficient query
AbstractIn recent years, blockchain technology has emerged as a topic of increasing interest within the field of computer science research. Due to its characteristics of decentralisation, information traceability, and tamper-resistance, it has been widely ...
- research-articleOctober 2024
DELIGHT: a willingness-aware collaborative edge service offloading utilizing deep reinforcement learning
AbstractUnder the impetus of mobile edge computing, mobile access networks and the Internet are deeply integrated providing low-latency, high-reliability computing power for service innovation. Due to the limitation of computing power resources, it is ...
- research-articleOctober 2024
Adaptive virtual machine placement: a dynamic approach for energy-efficiency, QoS enhancement, and security optimization
AbstractOver the past decade, numerous studies have explored virtual machine (VM) placement with diverse objectives, including energy consumption reduction, carbon footprint reduction, migration minimization, mitigation of service level agreement (SLA) ...
- research-articleOctober 2024
An efficient class-dependent learning label approach using feature selection to improve multi-label classification algorithms
AbstractRecently, multi-label categorization learning has emerged as a new area of study in machine learning since it offers a multi-dimensional perspective of the multi-dimensional object. To build a multi-label classification (MLC) system that is both ...
- research-articleOctober 2024
Blockchain-based remote data integrity auditing scheme with deduplication mechanism
AbstractRemote data integrity auditing (RDIA) schemes can inspect the integrity of outsourced data. And deduplication improves the utilization of cloud storage space. Therefore, a considerable number of remote data integrity auditing schemes with ...
- research-articleOctober 2024
Ride-hailing pick-up area recommendation in a vehicle-cloud collaborative environment: a feature-aware personalized clustering federated learning approach
AbstractThe recommendation of passenger pickup zones can enhance driver efficiency, improve passenger experience, and optimize urban traffic management. However, current issues such as direct access to sensitive data and lack of data sharing between ...
- research-articleOctober 2024
Dmaf: data-model anti-forgetting for federated incremental learning
AbstractFederated Learning has received much attention due to its data privacy benefits, but most existing approaches assume that client classes are fixed. Clients may remove old classes and add new ones, leading to catastrophic forgetting of the model. ...
- research-articleOctober 2024
Ensemble clustering by block diagonal representation
AbstractEnsemble clustering integrates all basic clustering results to produce a better clustering result. Existing ensemble clustering methods typically rely on a co-association matrix (CA), which measures the number of occurrences two samples are ...
- research-articleOctober 2024
SCECA U-Net crop classification for UAV remote sensing image
AbstractTimely and accurate extraction of crop planting units plays a crucial role in crop yield estimation, soil management and disaster warning. For small-scale crop cultivation systems, accurate mapping of crop types is challenging due to the presence ...
- research-articleOctober 2024
Towards a reliable spam detection: an ensemble classification with rejection option
AbstractDespite significant investments in server infrastructure, spam continues to pose several challenges to the email ecosystem. These include ineffective detection and waste of computing resources. The constant need for periodic updates of spam ...
- research-articleOctober 2024
A scalable rule learning approach fusing multiple sources of information
AbstractLogical rules enable knowledge graph reasoning in an explicit and interpretable way. Hybrid learning approaches that combine logical rules with representation learning has shown strong capabilities in knowledge graph reasoning tasks by integrating ...
- research-articleOctober 2024
- research-articleOctober 2024
Region of interest encryption algorithm for images based on lifting scheme and object detection
AbstractSecuring image transmissions has become critical as the demand for image sharing and storage grows. In some commercial uses, in order to achieve a balance between encryption security and efficiency, some researchers have tried to encrypt only the ...