OPEN ACCESS
- Innovative IoT device identification method based on residual-connected Capsule Network
- Cloud data privacy protection with homomorphic algorithm: a systematic literature review
- A virtual machine group-oriented TPM system for trusted cloud computing
- Body Cosmos 2.0: embodied biofeedback interface for dancing
- Cloud-enabled style-aware artwork composite recommendation based on correlation graph
- Graph attention network vulnerability detection model with global feature augmentation for smart contracts
- Energy-aware real-time task partitioning on multi-core processors with shared resources
- Optimized tourist point-of-interest recommendation through ARIMA and SVD in edge environment
- Integrating wearable health devices with AI and edge computing for personalized rehabilitation
- An efficient blockchain-based resource allocation and secure data storage model using Fire Hawk Optimization and entropy in health tourism
- A nature-inspired dual phased fuzzy hybrid algorithm for adaptive self-healing and dynamic energy-aware resource management in cloud computing
- MkRP: multiple k registry placement for fast container deployment on edge computing
- Advanced system log analyzer for anomaly detection and cyber forensic investigations using LSTM and transformer networks
- Optimizing Spark job scheduling with distributional deep learning in cloud environments
- Applications of extended reality in pilot flight simulator training: a systematic review with meta-analysis
- Machine learning-based hybrid technique to enhance cyber-attack perspective
- Blockchain-enabled secure Internet of Medical Things (IoMT) architecture for multi-modal data fusion in precision cancer diagnosis and continuous monitoring
- Integrating machine learning and encryption for effective data management in blood bank supply chains
- Detecting hidden communication threats in cloud systems using advanced pattern and threat propagation analysis
- KaiBiLi: gesture-based immersive virtual reality ceremony for traditional Chinese cultural activities
- QHRMOF: A Quantum-Inspired hybrid Multi-Objective framework for Energy-Efficient task scheduling and load balancing in cloud computing
- Application of artificial intelligence in assisting treatment of gynecologic tumors: a systematic review
- IoT-enabled fog computing framework: heat stroke risk analysis
- Adaptive edge-fog healthcare networks: a novel framework for emergency response management
- An energy-conscious scheduling framework for serverless edge computing in IoT
- Blockchain-enhanced security and bayesian trust assessment for secure task scheduling in latency-critical fog computing environments
- A novel Location-Aware job scheduling framework for optimizing Fog-Cloud IoT systems: insights from dynamic traffic management
- Optimizing resource allocation in precision farming using quantum enhanced algorithms and quantum sensor networks
- Development and validation of a machine learning model for predicting venous thromboembolism complications following colorectal cancer surgery
- Lightweight and mobile artificial intelligence and immersive technologies in aviation
- Multimodal dynamic hierarchical clustering model for post-stroke cognitive impairment prediction
- Energy-efficient adaptive routing in heterogeneous wireless sensor networks via hybrid PSO and dynamic clustering
- PCL-RC: a parallel cloud resource load prediction model based on feature optimization
- Deep learning radiomics of elastography for diagnosing compensated advanced chronic liver disease: an international multicenter study
- Communication-efficient and privacy-preserving federated learning for medical image classification in multi-institutional edge computing
- Quantum computing empowering blockchain technology with post quantum resistant cryptography for multimedia data privacy preservation in cloud-enabled public auditing platforms
- ArtifactOps and ArtifactDL: a methodology and a language for conceptualizing and operationalising different types of pipelines
- A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks
ABSTRACT
Coming soon
