Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- correctionJanuary 2025
- research-articleJanuary 2025
Improved sparrow search algorithm with adaptive multi-strategy hierarchical mechanism for global optimization and engineering problems
AbstractAiming at the problem that the sparrow search algorithm (SSA) does not have high optimization accuracy and is prone to fall into local optimum, an improved sparrow search algorithm with adaptive multi-strategy hierarchical mechanism is proposed (...
- review-articleJanuary 2025
Review of malicious code detection in data mining applications: challenges, algorithms, and future direction
- Abdul Razaque,
- Gulnara Bektemyssova,
- Joon Yoo,
- Salim Hariri,
- Meer Jaro Khan,
- Nurgul Nalgozhina,
- Jaeryong Hwang,
- M. Ajmal Khan
AbstractIn an era where machine learning critically underpins business operations, detecting vulnerabilities introduced by malicious code has become increasingly essential. Although prior research has extensively explored malicious code within machine ...
- research-articleJanuary 2025
Random cluster parallel PBFT global consensus for consistent blockchain distributed ledger
AbstractBlockchain is a distributed ledger that various applications can use to store data in a secure, decentralized, and immutable manner. The key piece in a blockchain is the consensus algorithm that different blockchain nodes run to obtain mutual ...
- research-articleJanuary 2025
Group-driven Remora Optimization Algorithm with multiple search and regeneration strategies
AbstractWe have introduced group-driven strategies into the conventional remora optimization algorithm (ROA) and amalgamated regeneration strategies to further enhance the generalization ability. This proposed algorithm were termed the Group-Driven Remora ...
-
- research-articleJanuary 2025
CFL-ATELM: an approach to detect botnet traffic by analyzing non-IID and imbalanced data in IoT-edge based 6G networks
AbstractThe 6G network suffers from large-scale botnet attacks due to the extensive scale and complexity of the network. To address security and communication overhead issues in IoT-Edge based 6G Networks, the next-generation IDS adopts edge intelligence ...
- review-articleJanuary 2025
A survey on resource scheduling approaches in multi-access edge computing environment: a deep reinforcement learning study
AbstractMulti-access edge computing (MEC) brings many services closer to user devices, alleviating the pressure on resource-constrained devices. It enables devices to offload compute-intensive tasks to nearby MEC servers. Hence, improving users’ quality ...
- research-articleJanuary 2025
Optimization of computational offloading in the mobile edge: a game theoretic approach
AbstractWith the rise of Fifth-Generation (5 G) networks, smart applications are becoming increasingly computation-intensive and latency-sensitive. To address these challenges, this paper introduces a novel intelligent broker-based architecture to manage ...
- research-articleJanuary 2025
Qaas: hybrid cryptocurrency wallet-as-a-service based on Quantum RNG
AbstractBlockchain wallets use two primary key generation schemes: non-deterministic (ND) and hierarchical deterministic (HD). ND key generation scheme provides better fund distribution but has issues with backup complexity and memory utilization. HD key ...
- research-articleJanuary 2025
Multilevel learning for enhanced traffic congestion prediction using anomaly detection and ensemble learning
AbstractTraffic congestion is a major challenge in modern transportation systems, leading to increased travel time, greater fuel consumption, and higher levels of harmful emissions. Accurate traffic congestion forecasting is crucial for effective traffic ...
- research-articleJanuary 2025
Multi-scale fusion dynamic graph convolutional recurrent network for traffic forecasting
AbstractTraffic forecasting plays an essential role in urban planning and traffic management. Nevertheless, the intricate spatio-temporal connections in traffic data make traffic prediction particularly tough. Although many traffic prediction methods have ...
- research-articleJanuary 2025
Improved multi-strategy beluga whale optimization algorithm: a case study for multiple engineering optimization problems
AbstractThe Beluga Whale Optimization (BWO) is a meta-heuristic algorithm that simulates the life behavior of beluga whales. Aiming at the shortcomings of the BWO, such as poor solution accuracy, insufficient robust performance, and weak ability to jump ...
- research-articleJanuary 2025
Critical vector based evolutionary algorithm for large-scale multi-objective optimization
AbstractIn this work, we propose a method for solving large-scale multi-objective problems based on problem transformation strategy. The key point of this method lies in how to construct the search subspace. First, the algorithm obtains a set of direction ...
- research-articleJanuary 2025
Novel offloading approach of computing task for internet of vehicles based on particle swarm optimization strategy
AbstractThe Internet of Vehicles (IOV) represents the integration of the Internet of Things within the realm of smart transportation, serving as a crucial component of the intelligent transportation system. With the emergence of more and more mobile ...
- research-articleJanuary 2025
Energy-efficient task offloading and efficient resource allocation for edge computing: a quantum inspired particle swarm optimization approach
AbstractEfficient processing of workflow applications (WAs) is crucial in edge computing environments to enhance efficiency, flexibility, collaboration, and cost savings. Workflow scheduling involves finding an optimal schedule for a group of sub-tasks ...
- research-articleJanuary 2025
Reinforcement learning-based task scheduling for heterogeneous computing in end-edge-cloud environment
AbstractThe End-Edge-Cloud (EEC) computing framework can offer low-latency, high-quality services to users of diverse demands by leveraging pervasive resources. However, the inherent disparities in task requirements and the strong heterogeneity of ...
- research-articleJanuary 2025
Enhancing chernobyl disaster optimization: a novel hybridization approach with modified grey wolf optimizer for solving complex optimization problems
AbstractRecent advancements in metaheuristic methods have enhanced the ability to identify global solutions by balancing exploration and exploitation. Among these, the Chernobyl Disaster Optimizer (CDO), introduced in 2023 and inspired by the Chernobyl ...
- research-articleJanuary 2025
TDS: fast answering reachability queries with hierarchical traversal trees
AbstractReachability query is a fundamental operation in graph applications, including social network analysis, knowledge graph based NLP. Current label+G solutions tend to directly answer reachability queries between near vertices. When two vertices are ...
- research-articleJanuary 2025
Multi-objective dynamic distributed flexible job shop scheduling problem considering uncertain processing time
AbstractIn this paper, a dynamic distributed flexible job-shop scheduling problem considering uncertain processing time of operation (DDFJSPT) is proposed for the first time. A two-stage efficient memetic algorithm (EMA) is presented to solve the DDFJSPT ...
- research-articleJanuary 2025
ESDN: edge computing task scheduling strategy based on dilated convolutional neural network and quasi-newton algorithm
AbstractEdge computing systems face the challenges of node heterogeneity and task diversity, and their efficient operation relies on suitable task scheduling methods. Existing task scheduling methods have the problems of difficult application conditions ...