Cluster Computing

Titel Veröffentlichungsdatum Sprache Zitate
Retraction Note: A study on supervised machine learning algorithm to improvise intrusion detection systems for mobile ad hoc networks2022/12/26English
Retraction Note: Multimedia and multi-feature cluster fusion model based on saliency for mobile network applications2022/12/26English
An Intrusion Detection System using Deep Cellular Learning Automata and Semantic Hierarchy for Enhancing RPL Protocol Security2022/12/26English
Retraction Note: Pattern mining model based on improved neural network and modified genetic algorithm for cloud mobile networks2022/12/28English
SRG: a clustering algorithm based on scale division and region growing2022/12/24English
CAC-WOA: context aware clustering with whale optimization algorithm for knowledge discovery from multidimensional space in electricity application2023/01/15English
CBLA_PM: an improved ann-based power consumption prediction algorithm for multi-type jobs on heterogeneous computing server2023/01/04English
A comprehensive node-based botnet detection framework for IoT network2024/04/18English
Blockchain-based secure and scalable supply chain management system to prevent drug counterfeiting2024/04/18English
Optimal analysis in cognitive radio networks with imperfect sensing based on retrial queues with feedback and priority2024/04/18English
Slam loop closure detection algorithm based on MSA-SG2024/04/18English
StreamFilter: a framework for distributed processing of range queries over streaming data with fine-grained access control2024/04/18English
Deep learning vs. adversarial noise: a battle in malware image analysis2024/04/17English
A metaheuristic approach based on coronavirus herd immunity optimiser for breast cancer diagnosis2024/04/23English
ARPMEC: an adaptive mobile edge computing-based routing protocol for IoT networks2024/04/23English
Reinforcement learning marine predators algorithm for global optimization2024/04/17English
Drones as a service (DaaS) for 5G networks and blockchain-assisted IoT-based smart city infrastructure2024/04/17English
A relaxed and faster switch migration framework to balance the load of distributed control plane in software defined networks2024/04/14English
A privacy preserving quantum authentication scheme for secure data sharing in wireless body area networks2024/04/14English
Multi-modal Battle Royale optimizer2024/04/14English
Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature2024/04/14English
Data breaches in healthcare: security mechanisms for attack mitigation2024/04/13English
An optimized federated learning method based on soft label grouping for heterogeneous IoT2024/04/13English
Task scheduling approach in fog and cloud computing using Jellyfish Search (JS) optimizer and Improved Harris Hawks optimization (IHHO) algorithm enhanced by deep learning2024/04/13English
ServiceNet: resource-efficient architecture for topology discovery in large-scale multi-tenant clouds2024/04/13English
Advances in deep learning intrusion detection over encrypted data with privacy preservation: a systematic review2024/04/15English
Exploring the stochastic patterns of hyperchaotic Lorenz systems with variable fractional order and radial basis function networks2024/04/15English
Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparency2024/04/19English
Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart cities2024/04/21English
DFARM: a deadline-aware fault-tolerant scheduler for cloud computing2024/04/20English