Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 13, Issue 1Nov 2024Current Issue
Reflects downloads up to 22 Nov 2024Bibliometrics
research-article
Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials
Abstract

Industrial data trading can considerably enhance the economic and social value of abundant data resources. However, traditional data trading models are plagued by critical flaws in fairness, security, privacy and regulation. To tackle the above ...

research-article
Genetic algorithm-based secure cooperative control for high-order nonlinear multi-agent systems with unknown dynamics
Abstract

Research has recently grown on multi-agent systems (MAS) and their coordination and secure cooperative control, for example in the field of edge-cloud computing. MAS offers robustness and flexibility compared to centralized systems by distributing ...

research-article
Timed-release encryption anonymous interaction protocol based on smart contract
Abstract

Timed-release encryption (TRE) is a cryptographic primitive that can control the decryption time and has significant application value in time-sensitive scenarios. To solve the reliability issue of nodes in existing TRE anonymous interaction ...

research-article
Traffic prediction for diverse edge IoT data using graph network
Abstract

More researchers are proposing artificial intelligence algorithms for Internet of Things (IoT) devices and applying them to themes such as smart cities and smart transportation. In recent years, relevant research has mainly focused on data ...

research-article
BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud
Abstract

Cloud computing technology offers flexible and expedient services that carry a variety of profits for both societies as well as individuals. De-duplication techniques were developed to minimize redundant data in the cloud storage. But, one of the ...

research-article
Edge-cloud computing oriented large-scale online music education mechanism driven by neural networks
Abstract

With the advent of the big data era, edge cloud computing has developed rapidly. In this era of popular digital music, various technologies have brought great convenience to online music education. But vast databases of digital music prevent ...

research-article
Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model
Abstract

Artificial intelligence and blockchain technology have become indispensable in the era of the digital economy, particularly in the field of financial financing. However, when it comes to supply chain finance (SCF), existing models primarily focus ...

research-article
Evaluation of AI tools for healthcare networks at the cloud-edge interaction to diagnose autism in educational environments
Abstract

Physical, social, and routine environments can be challenging for learners with autism spectrum disorder (ASD). ASD is a developmental disorder caused by neurological problems. In schools and educational environments, this disorder may not only ...

research-article
Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non-stationary data patterns
Abstract

In this study, we present the EEG-GCN, a novel hybrid model for the prediction of time series data, adept at addressing the inherent challenges posed by the data's complex, non-linear, and periodic nature, as well as the noise that frequently ...

research-article
SLA-ORECS: an SLA-oriented framework for reallocating resources in edge-cloud systems
Abstract

The emergence of the Fifth Generation (5G) era has ushered in a new era of diverse business scenarios, primarily characterized by data-intensive and latency-sensitive applications. Edge computing technology integrates the information services ...

research-article
MSFANet: multi-scale fusion attention network for mangrove remote sensing lmage segmentation using pattern recognition
Abstract

Mangroves are ecosystems that grow in the intertidal areas of coastal zones, playing crucial ecological roles and possessing unique economic and social values. They have garnered significant attention and research interest. Semantic segmentation ...

research-article
Multi-type concept drift detection under a dual-layer variable sliding window in frequent pattern mining with cloud computing
Abstract

The detection of different types of concept drift has wide applications in the fields of cloud computing and security information detection. Concept drift detection can indeed assist in promptly identifying instances where model performance ...

research-article
Context-aware environment online monitoring for safety autonomous vehicle systems: an automata-theoretic approach
Abstract

Intelligent Transport System (ITS) is a typical class of Cyber-Physical Systems (CPS), and due to the special characteristics of such systems, higher requirements are placed on system security. Runtime verification is a lightweight verification ...

research-article
A new method of dynamic network security analysis based on dynamic uncertain causality graph
Abstract

In the context of cloud computing, network attackers usually exhibit complex, dynamic, and diverse behavior characteristics. Existing research methods, such as Bayesian attack graphs, lack evidence correlation and real-time reflection of the ...

research-article
Task offloading exploiting grey wolf optimization in collaborative edge computing
Abstract

The emergence of mobile edge computing (MEC) has brought cloud services to nearby edge servers facilitating penetration of real-time and resource-consuming applications from smart mobile devices at a high rate. The problem of task offloading from ...

research-article
An efficient hybrid optimization of ETL process in data warehouse of cloud architecture
Abstract

In big data, analysis data is collected from different sources in various formats, transforming into the aspect of cleansing the data, customization, and loading it into a Data Warehouse. Extracting data in other formats and transforming it to the ...

research-article
A resource competition-based truthful mechanism for IoV edge computing resource allocation with a lowest revenue limit
Abstract

Resource allocation in Internet of Vehicles (IoV) edge computing is currently a research hotspot. Existing studies focus on social welfare or revenue maximization. However, there is little research on lowest revenue guarantees, which is a problem ...

research-article
Edge-cloud computing cooperation detection of dust concentration for risk warning research
Abstract

An edge-cloud computing collaborative dust concentration detection architecture is proposed for real-time operation of intelligent algorithms to reduce the warning delay. And, an end-to-end three-channel convolutional neural network (E2E-SCNN) ...

research-article
A Transformer-based network intrusion detection approach for cloud security
Abstract

The distributed architecture of cloud computing necessitates robust defense mechanisms to secure network-accessible resources against a diverse and dynamic threat landscape. A Network Intrusion Detection System (NIDS) is pivotal in this context, ...

research-article
Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.0
Abstract

Web3.0 represents the ongoing evolution of blockchain technology, placing a strong emphasis on establishing a decentralized and user-controlled Internet. Current data delegation solutions for Web3.0 predominantly rely on attribute-based encryption ...

research-article
Time series forecasting model for non-stationary series pattern extraction using deep learning and GARCH modeling
Abstract

This paper presents a novel approach to time series forecasting, an area of significant importance across diverse fields such as finance, meteorology, and industrial production. Time series data, characterized by its complexity involving trends, ...

research-article
Innovative deep learning techniques for monitoring aggressive behavior in social media posts
Abstract

The study aims to evaluate and compare the performance of various machine learning (ML) classifiers in the context of detecting cyber-trolling behaviors. With the rising prevalence of online harassment, developing effective automated tools for ...

research-article
Secure semantic search using deep learning in a blockchain-assisted multi-user setting
Abstract

Deep learning-based semantic search (DLSS) aims to bridge the gap between experts and non-experts in search. Experts can create precise queries due to their prior knowledge, while non-experts struggle with specific terms and concepts, making their ...

research-article
Multivariate time series collaborative compression for monitoring systems in securing cloud-based digital twin
Abstract

With the booming of cloud-based digital twin systems, monitoring key performance indicators has become crucial for ensuring system security and reliability. Due to the massive amount of monitoring data generated, data compression is necessary to ...

research-article
Small object Lentinula Edodes logs contamination detection method based on improved YOLOv7 in edge-cloud computing
Abstract

A small object Lentinus Edodes logs contamination detection method (SRW-YOLO) based on improved YOLOv7 in edge-cloud computing environment was proposed to address the problem of the difficulty in the detection of small object contaminated areas of ...

research-article
An adaptive routing strategy in P2P-based Edge Cloud
Abstract

P2P-based Edge Cloud (PEC) is widely used in Internet of Things (IoT). Inevitably, the sensor data routing technology has a significant impact on the performance of PEC. Due to its prevalence and complexity, the existing routing technologies in ...

research-article
Detection of cotton leaf curl disease’s susceptibility scale level based on deep learning
Abstract

Cotton, a crucial cash crop in Pakistan, faces persistent threats from diseases, notably the Cotton Leaf Curl Virus (CLCuV). Detecting these diseases accurately and early is vital for effective management. This paper offers a comprehensive account ...

review-article
Challenges in remote sensing based climate and crop monitoring: navigating the complexities using AI
Abstract

The fast human climate change we are witnessing in the early twenty-first century is inextricably linked to the health and function of the biosphere. Climate change is affecting ecosystems through changes in mean conditions and variability, as ...

research-article
A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matching
Abstract

With the exponential growth of various data interactions on network systems, network intrusions are also increasing. The emergence of edge computing technology brings a new solution to network security. However, due to the difficulty of processing ...

research-article
A knowledge-graph based text summarization scheme for mobile edge computing
Abstract

As the demand for edge services intensifies, text, being the most common type of data, has seen a significant expansion in data volume and an escalation in processing complexity. Furthermore, mobile edge computing (MEC) service systems often faces ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.