Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials
Industrial data trading can considerably enhance the economic and social value of abundant data resources. However, traditional data trading models are plagued by critical flaws in fairness, security, privacy and regulation. To tackle the above ...
Genetic algorithm-based secure cooperative control for high-order nonlinear multi-agent systems with unknown dynamics
- Xin Wang,
- Dongsheng Yang,
- D Raveena Judie Dolly,
- Shuang Chen,
- Madini O. Alassafi,
- Fawaz E. Alsaadi,
- Jianhui Lyu
Research has recently grown on multi-agent systems (MAS) and their coordination and secure cooperative control, for example in the field of edge-cloud computing. MAS offers robustness and flexibility compared to centralized systems by distributing ...
Traffic prediction for diverse edge IoT data using graph network
More researchers are proposing artificial intelligence algorithms for Internet of Things (IoT) devices and applying them to themes such as smart cities and smart transportation. In recent years, relevant research has mainly focused on data ...
BGNBA-OCO based privacy preserving attribute based access control with data duplication for secure storage in cloud
Cloud computing technology offers flexible and expedient services that carry a variety of profits for both societies as well as individuals. De-duplication techniques were developed to minimize redundant data in the cloud storage. But, one of the ...
Edge-cloud computing oriented large-scale online music education mechanism driven by neural networks
With the advent of the big data era, edge cloud computing has developed rapidly. In this era of popular digital music, various technologies have brought great convenience to online music education. But vast databases of digital music prevent ...
Enhancing trust transfer in supply chain finance: a blockchain-based transitive trust model
Artificial intelligence and blockchain technology have become indispensable in the era of the digital economy, particularly in the field of financial financing. However, when it comes to supply chain finance (SCF), existing models primarily focus ...
Evaluation of AI tools for healthcare networks at the cloud-edge interaction to diagnose autism in educational environments
Physical, social, and routine environments can be challenging for learners with autism spectrum disorder (ASD). ASD is a developmental disorder caused by neurological problems. In schools and educational environments, this disorder may not only ...
Advanced series decomposition with a gated recurrent unit and graph convolutional neural network for non-stationary data patterns
- Huimin Han,
- Harold Neira-Molina,
- Asad Khan,
- Meie Fang,
- Haitham A. Mahmoud,
- Emad Mahrous Awwad,
- Bilal Ahmed,
- Yazeed Yasin Ghadi
In this study, we present the EEG-GCN, a novel hybrid model for the prediction of time series data, adept at addressing the inherent challenges posed by the data's complex, non-linear, and periodic nature, as well as the noise that frequently ...
SLA-ORECS: an SLA-oriented framework for reallocating resources in edge-cloud systems
The emergence of the Fifth Generation (5G) era has ushered in a new era of diverse business scenarios, primarily characterized by data-intensive and latency-sensitive applications. Edge computing technology integrates the information services ...
MSFANet: multi-scale fusion attention network for mangrove remote sensing lmage segmentation using pattern recognition
Mangroves are ecosystems that grow in the intertidal areas of coastal zones, playing crucial ecological roles and possessing unique economic and social values. They have garnered significant attention and research interest. Semantic segmentation ...
Multi-type concept drift detection under a dual-layer variable sliding window in frequent pattern mining with cloud computing
The detection of different types of concept drift has wide applications in the fields of cloud computing and security information detection. Concept drift detection can indeed assist in promptly identifying instances where model performance ...
Context-aware environment online monitoring for safety autonomous vehicle systems: an automata-theoretic approach
Intelligent Transport System (ITS) is a typical class of Cyber-Physical Systems (CPS), and due to the special characteristics of such systems, higher requirements are placed on system security. Runtime verification is a lightweight verification ...
A new method of dynamic network security analysis based on dynamic uncertain causality graph
In the context of cloud computing, network attackers usually exhibit complex, dynamic, and diverse behavior characteristics. Existing research methods, such as Bayesian attack graphs, lack evidence correlation and real-time reflection of the ...
An efficient hybrid optimization of ETL process in data warehouse of cloud architecture
In big data, analysis data is collected from different sources in various formats, transforming into the aspect of cleansing the data, customization, and loading it into a Data Warehouse. Extracting data in other formats and transforming it to the ...
A resource competition-based truthful mechanism for IoV edge computing resource allocation with a lowest revenue limit
Resource allocation in Internet of Vehicles (IoV) edge computing is currently a research hotspot. Existing studies focus on social welfare or revenue maximization. However, there is little research on lowest revenue guarantees, which is a problem ...
A Transformer-based network intrusion detection approach for cloud security
The distributed architecture of cloud computing necessitates robust defense mechanisms to secure network-accessible resources against a diverse and dynamic threat landscape. A Network Intrusion Detection System (NIDS) is pivotal in this context, ...
Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.0
Web3.0 represents the ongoing evolution of blockchain technology, placing a strong emphasis on establishing a decentralized and user-controlled Internet. Current data delegation solutions for Web3.0 predominantly rely on attribute-based encryption ...
Time series forecasting model for non-stationary series pattern extraction using deep learning and GARCH modeling
- Huimin Han,
- Zehua Liu,
- Mauricio Barrios Barrios,
- Jiuhao Li,
- Zhixiong Zeng,
- Nadia Sarhan,
- Emad Mahrous Awwad
This paper presents a novel approach to time series forecasting, an area of significant importance across diverse fields such as finance, meteorology, and industrial production. Time series data, characterized by its complexity involving trends, ...
Innovative deep learning techniques for monitoring aggressive behavior in social media posts
The study aims to evaluate and compare the performance of various machine learning (ML) classifiers in the context of detecting cyber-trolling behaviors. With the rising prevalence of online harassment, developing effective automated tools for ...
Multivariate time series collaborative compression for monitoring systems in securing cloud-based digital twin
With the booming of cloud-based digital twin systems, monitoring key performance indicators has become crucial for ensuring system security and reliability. Due to the massive amount of monitoring data generated, data compression is necessary to ...
Small object Lentinula Edodes logs contamination detection method based on improved YOLOv7 in edge-cloud computing
A small object Lentinus Edodes logs contamination detection method (SRW-YOLO) based on improved YOLOv7 in edge-cloud computing environment was proposed to address the problem of the difficulty in the detection of small object contaminated areas of ...
An adaptive routing strategy in P2P-based Edge Cloud
P2P-based Edge Cloud (PEC) is widely used in Internet of Things (IoT). Inevitably, the sensor data routing technology has a significant impact on the performance of PEC. Due to its prevalence and complexity, the existing routing technologies in ...
Detection of cotton leaf curl disease’s susceptibility scale level based on deep learning
- Rubaina Nazeer,
- Sajid Ali,
- Zhihua Hu,
- Ghulam Jillani Ansari,
- Muna Al-Razgan,
- Emad Mahrous Awwad,
- Yazeed Yasin Ghadi
Cotton, a crucial cash crop in Pakistan, faces persistent threats from diseases, notably the Cotton Leaf Curl Virus (CLCuV). Detecting these diseases accurately and early is vital for effective management. This paper offers a comprehensive account ...
Challenges in remote sensing based climate and crop monitoring: navigating the complexities using AI
The fast human climate change we are witnessing in the early twenty-first century is inextricably linked to the health and function of the biosphere. Climate change is affecting ecosystems through changes in mean conditions and variability, as ...
A multi-classification detection model for imbalanced data in NIDS based on reconstruction and feature matching
With the exponential growth of various data interactions on network systems, network intrusions are also increasing. The emergence of edge computing technology brings a new solution to network security. However, due to the difficulty of processing ...
A knowledge-graph based text summarization scheme for mobile edge computing
As the demand for edge services intensifies, text, being the most common type of data, has seen a significant expansion in data volume and an escalation in processing complexity. Furthermore, mobile edge computing (MEC) service systems often faces ...