Online first articles
Articles not assigned to an issue 341 articles
-
-
CSDANet: a new lightweight fault diagnosis framework towards heavy noise and small samples
Authors (first, second and last of 6)
- Zhao Xu
- Zhiyang Jia
- Wenpei Dong
- Content type: OriginalPaper
- Published: 25 April 2024
-
From static code analysis to visual models of microservice architecture
Authors (first, second and last of 4)
- Tomas Cerny
- Amr S. Abdelfattah
- Davide Taibi
- Content type: OriginalPaper
- Published: 24 April 2024
This is part of 1 collection: -
Design tactics for tailoring transformer architectures to cybersecurity challenges
Authors
- Cigdem Avci
- Bedir Tekinerdogan
- Cagatay Catal
- Content type: OriginalPaper
- Open Access
- Published: 24 April 2024
-
Hybrid-grained migration method for load redistribution in heavily-loaded fog nodes
Authors
- Mohammed Jasim
- Nazli Siasi
- Content type: OriginalPaper
- Published: 24 April 2024
-
Compound improved Harris hawks optimization for global and engineering optimization
Authors (first, second and last of 6)
- Chengtian Ouyang
- Chang Liao
- Chengye Zou
- Content type: OriginalPaper
- Published: 24 April 2024
-
CLARA: clustered learning automata-based routing algorithm for efficient FANET communication
Authors
- Somayeh Danesh
- Javad Akbari Torkestani
- Content type: OriginalPaper
- Published: 24 April 2024
-
A mean opinion score prediction model for VoIP calls offloading handover from LTE to WiFi
Authors
- Najib Mouhassine
- Mohamed Moughit
- Content type: OriginalPaper
- Published: 24 April 2024
-
A metaheuristic approach based on coronavirus herd immunity optimiser for breast cancer diagnosis
Authors (first, second and last of 5)
- Ali Hosseinalipour
- Reza Ghanbarzadeh
- Seyedali Mirjalili
- Content type: OriginalPaper
- Published: 23 April 2024
-
ARPMEC: an adaptive mobile edge computing-based routing protocol for IoT networks
Authors
- Miguel Landry Foko Sindjoung
- Mthulisi Velempini
- Vianney Kengne Tchendji
- Content type: OriginalPaper
- Open Access
- Published: 23 April 2024
-
Dynamic task offloading for resource allocation and privacy-preserving framework in Kubeedge-based edge computing using machine learning
Authors (first, second and last of 5)
- Sadananda Lingayya
- Sathyendra Bhat Jodumutt
- Senthilkumar Chandrasekan
- Content type: OriginalPaper
- Published: 22 April 2024
-
Autonomous UAV-based surveillance system for multi-target detection using reinforcement learning
Authors (first, second and last of 4)
- Haythem Bany Salameh
- Ayyoub Hussienat
- Ahmad Al-Ajlouni
- Content type: OriginalPaper
- Published: 21 April 2024
-
Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart cities
Authors
- Sujit Biswas
- Rajat Subhra Goswami
- K. Hemant Kumar Reddy
- Content type: OriginalPaper
- Published: 21 April 2024
-
An efficient improved exponential distribution optimizer: application to the global, engineering and combinatorial optimization problems
Authors (first, second and last of 4)
- Essam H. Houssein
- Mahmoud Khalaf Saeed
- Mustafa M. Al-Sayed
- Content type: OriginalPaper
- Open Access
- Published: 20 April 2024
-
DFARM: a deadline-aware fault-tolerant scheduler for cloud computing
Authors (first, second and last of 4)
- Ahmad Awan
- Muhammad Aleem
- Radu Prodan
- Content type: OriginalPaper
- Published: 20 April 2024
-
Transforming online voting: a novel system utilizing blockchain and biometric verification for enhanced security, privacy, and transparency
Authors (first, second and last of 4)
- Md Jobair Hossain Faruk
- Fazlul Alam
- Akond Rahman
- Content type: OriginalPaper
- Open Access
- Published: 19 April 2024
This is part of 1 collection: -
Slam loop closure detection algorithm based on MSA-SG
Authors (first, second and last of 5)
- Heng Zhang
- Yihong Zhang
- Yawei Li
- Content type: OriginalPaper
- Published: 18 April 2024
-
StreamFilter: a framework for distributed processing of range queries over streaming data with fine-grained access control
Authors
- Shahab Safaee
- Meghdad Mirabi
- Ali Asghar Safaei
- Content type: OriginalPaper
- Published: 18 April 2024
-
Optimal analysis in cognitive radio networks with imperfect sensing based on retrial queues with feedback and priority
Authors (first, second and last of 4)
- Ruiling Tian
- Yadan Xue
- Yuting Song
- Content type: OriginalPaper
- Published: 18 April 2024
-
A comprehensive node-based botnet detection framework for IoT network
Authors (first, second and last of 4)
- Abdulaziz Aldaej
- Tariq Ahamed Ahanger
- Imdad Ullah
- Content type: OriginalPaper
- Published: 18 April 2024
-
Blockchain-based secure and scalable supply chain management system to prevent drug counterfeiting
Authors
- Sagnik Datta
- Suyel Namasudra
- Content type: OriginalPaper
- Published: 18 April 2024
-
Drones as a service (DaaS) for 5G networks and blockchain-assisted IoT-based smart city infrastructure
Authors (first, second and last of 4)
- Tanya Garg
- Shashank Gupta
- Meghna Raj
- Content type: ReviewPaper
- Published: 17 April 2024
-
Deep learning vs. adversarial noise: a battle in malware image analysis
Authors (first, second and last of 4)
- K. A. Asmitha
- Vinod Puthuvath
- S. L. Ananth
- Content type: OriginalPaper
- Published: 17 April 2024
-
Reinforcement learning marine predators algorithm for global optimization
Authors (first, second and last of 6)
- Jianlan Wang
- Zhendong Wang
- Dahai Li
- Content type: OriginalPaper
- Published: 17 April 2024
-
Cepair: an AI-powered and fog-based predictive CEP system for air quality monitoring
Authors
- Mehmet Ulvi Åžimsek
- İbrahim Kök
- Suat Özdemir
- Content type: OriginalPaper
- Open Access
- Published: 16 April 2024
-
Blockchain-based cyber-security trust model with multi-risk protection scheme for secure data transmission in cloud computing
Authors (first, second and last of 4)
- Mohd Akbar
- Mohammed Mujtaba Waseem
- Praveen Barmavatu
- Content type: OriginalPaper
- Published: 16 April 2024
-
When Fewer Cores Is Faster: A Parametric Study of Undersubscription in High-Performance Computing
Authors
- Reid Prichard
- Wayne Strasser
- Content type: OriginalPaper
- Published: 16 April 2024
-
Securing internet of things using machine and deep learning methods: a survey
Authors (first, second and last of 5)
- Ali Ghaffari
- Nasim Jelodari
- Bahman Arasteh
- Content type: OriginalPaper
- Open Access
- Published: 16 April 2024
-
Advances in deep learning intrusion detection over encrypted data with privacy preservation: a systematic review
Authors (first, second and last of 6)
- Fatma Hendaoui
- Ahlem Ferchichi
- Manel Khazri Khelifi
- Content type: ReviewPaper
- Published: 15 April 2024
-
Exploring the stochastic patterns of hyperchaotic Lorenz systems with variable fractional order and radial basis function networks
Authors
- Muhammad Awais
- Muhammad Adnan Khan
- Zia Bashir
- Content type: OriginalPaper
- Published: 15 April 2024
-
Multi-modal Battle Royale optimizer
Authors
- K. Dilşad Çiçek
- Taymaz Akan
- OÄŸuz Bayat
- Content type: OriginalPaper
- Open Access
- Published: 14 April 2024
-
A privacy preserving quantum authentication scheme for secure data sharing in wireless body area networks
Authors
- Sunil Prajapat
- Pankaj Kumar
- Sandeep Kumar
- Content type: OriginalPaper
- Published: 14 April 2024
-
Intrusion detection systems for IoT based on bio-inspired and machine learning techniques: a systematic review of the literature
Authors (first, second and last of 5)
- Rafika Saadouni
- Chirihane Gherbi
- Amina Khacha
- Content type: ReviewPaper
- Published: 14 April 2024
-
A relaxed and faster switch migration framework to balance the load of distributed control plane in software defined networks
Authors (first, second and last of 4)
- Ratul Sikder
- Md. Shohrab Hossain
- Mohammed Atiquzzaman
- Content type: OriginalPaper
- Published: 14 April 2024
-
An optimized federated learning method based on soft label grouping for heterogeneous IoT
Authors
- Yuxin Yang
- Yihang Luo
- Guangzhuo Zhu
- Content type: OriginalPaper
- Published: 13 April 2024
-
ServiceNet: resource-efficient architecture for topology discovery in large-scale multi-tenant clouds
Authors (first, second and last of 4)
- Angel Gama Garcia
- Jose M. Alcaraz Calero
- Qi Wang
- Content type: OriginalPaper
- Open Access
- Published: 13 April 2024
-
Data breaches in healthcare: security mechanisms for attack mitigation
Authors
- Lili Nemec Zlatolas
- Tatjana Welzer
- Lenka Lhotska
- Content type: ReviewPaper
- Open Access
- Published: 13 April 2024
-
Task scheduling approach in fog and cloud computing using Jellyfish Search (JS) optimizer and Improved Harris Hawks optimization (IHHO) algorithm enhanced by deep learning
Authors
- Zahra Jafari
- Ahmad Habibizad Navin
- Azadeh Zamanifar
- Content type: OriginalPaper
- Published: 13 April 2024
-
An improved cuckoo search algorithm for global optimization
Authors (first, second and last of 5)
- Yunsheng Tian
- Dan Zhang
- Xiaofeng Yue
- Content type: OriginalPaper
- Published: 12 April 2024
-
A task offloading strategy considering forwarding errors based on cloud–fog collaboration
Authors (first, second and last of 4)
- Yuan Zhao
- Hongmin Gao
- Yan Li
- Content type: OriginalPaper
- Published: 12 April 2024
-
Dynamic random mutation hybrid Harris hawk optimization and its application to training kernel extreme learning machine
Authors (first, second and last of 4)
- Ruiqi Song
- Weike Nie
- Suqin Xue
- Content type: OriginalPaper
- Published: 12 April 2024
-
TSoptEE: two-stage optimization technique for software development effort estimation
Authors
- Pravali Manchala
- Manjubala Bisi
- Content type: OriginalPaper
- Published: 12 April 2024
-
An efficient partial charging and data gathering strategy using multiple mobile vehicles in wireless rechargeable sensor networks
Authors
- Chandra Bhushan Kumar Yadav
- Dinesh Dash
- Content type: OriginalPaper
- Published: 12 April 2024
-
Hybrid metaheuristic schemes with different configurations and feedback mechanisms for optimal clustering applications
Authors
- Daisy Nkele Molokomme
- Adeiza James Onumanyi
- Adnan M. Abu-Mahfouz
- Content type: OriginalPaper
- Open Access
- Published: 12 April 2024
-
A transfer learning-based intrusion detection system for zero-day attack in communication-based train control system
Authors (first, second and last of 7)
- He Lu
- Yanan Zhao
- Yilong Ren
- Content type: OriginalPaper
- Published: 12 April 2024
-
Accelerating erasure coding by exploiting multiple repair paths in distributed storage systems
Authors
- Chanki Kim
- Kang-Wook Chon
- Content type: OriginalPaper
- Published: 12 April 2024
-
A background-based new scheduling approach for scheduling the IoT network task with data storage in cloud environment
Authors
- Santosh Shakya
- Priyanka Tripathi
- Content type: OriginalPaper
- Published: 12 April 2024
-
Network-aware virtual machine placement using enriched butterfly optimisation algorithm in cloud computing paradigm
Authors (first, second and last of 5)
- Veeramani Shanmugam
- Huo-Chong Ling
- Choo W. R. Chiong
- Content type: OriginalPaper
- Open Access
- Published: 12 April 2024
-
DNA-chaos governed cryptosystem for cloud-based medical image repository
Authors (first, second and last of 4)
- Nithya Chidambaram
- K. Thenmozhi
- Rengarajan Amirtharajan
- Content type: OriginalPaper
- Published: 12 April 2024
This is part of 1 collection: -
A local global attention based spatiotemporal network for traffic flow forecasting
Authors (first, second and last of 6)
- Yuanchun Lan
- Jiahao Ling
- Liyan Xiong
- Content type: OriginalPaper
- Published: 11 April 2024
For authors
Submit manuscriptWorking on a manuscript?
Avoid the most common mistakes and prepare your manuscript for journal editors.
Learn more