OPEN ACCESS
- Innovative IoT device identification method based on residual-connected Capsule Network
- Cloud data privacy protection with homomorphic algorithm: a systematic literature review
- A virtual machine group-oriented TPM system for trusted cloud computing
- Body Cosmos 2.0: embodied biofeedback interface for dancing
- Cloud-enabled style-aware artwork composite recommendation based on correlation graph
- Graph attention network vulnerability detection model with global feature augmentation for smart contracts
- Energy-aware real-time task partitioning on multi-core processors with shared resources
- Optimized tourist point-of-interest recommendation through ARIMA and SVD in edge environment
- Integrating wearable health devices with AI and edge computing for personalized rehabilitation
- An efficient blockchain-based resource allocation and secure data storage model using Fire Hawk Optimization and entropy in health tourism
- A nature-inspired dual phased fuzzy hybrid algorithm for adaptive self-healing and dynamic energy-aware resource management in cloud computing
- MkRP: multiple k registry placement for fast container deployment on edge computing
- Advanced system log analyzer for anomaly detection and cyber forensic investigations using LSTM and transformer networks
- Optimizing Spark job scheduling with distributional deep learning in cloud environments
- Applications of extended reality in pilot flight simulator training: a systematic review with meta-analysis
- Machine learning-based hybrid technique to enhance cyber-attack perspective
- Blockchain-enabled secure Internet of Medical Things (IoMT) architecture for multi-modal data fusion in precision cancer diagnosis and continuous monitoring
- Integrating machine learning and encryption for effective data management in blood bank supply chains
- Detecting hidden communication threats in cloud systems using advanced pattern and threat propagation analysis
- KaiBiLi: gesture-based immersive virtual reality ceremony for traditional Chinese cultural activities
- QHRMOF: A Quantum-Inspired hybrid Multi-Objective framework for Energy-Efficient task scheduling and load balancing in cloud computing
- Application of artificial intelligence in assisting treatment of gynecologic tumors: a systematic review
- Adaptive edge-fog healthcare networks: a novel framework for emergency response management
- An energy-conscious scheduling framework for serverless edge computing in IoT
- Blockchain-enhanced security and bayesian trust assessment for secure task scheduling in latency-critical fog computing environments
- IoT-enabled fog computing framework: heat stroke risk analysis
- A novel Location-Aware job scheduling framework for optimizing Fog-Cloud IoT systems: insights from dynamic traffic management
- Optimizing resource allocation in precision farming using quantum enhanced algorithms and quantum sensor networks
- Development and validation of a machine learning model for predicting venous thromboembolism complications following colorectal cancer surgery
- Lightweight and mobile artificial intelligence and immersive technologies in aviation
- Multimodal dynamic hierarchical clustering model for post-stroke cognitive impairment prediction
- Energy-efficient adaptive routing in heterogeneous wireless sensor networks via hybrid PSO and dynamic clustering
- PCL-RC: a parallel cloud resource load prediction model based on feature optimization
- Deep learning radiomics of elastography for diagnosing compensated advanced chronic liver disease: an international multicenter study
- Communication-efficient and privacy-preserving federated learning for medical image classification in multi-institutional edge computing
- Quantum computing empowering blockchain technology with post quantum resistant cryptography for multimedia data privacy preservation in cloud-enabled public auditing platforms
- ArtifactOps and ArtifactDL: a methodology and a language for conceptualizing and operationalising different types of pipelines
- A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks
- Memory-augment graph transformer based unsupervised detection model for identifying performance anomalies in highly-dynamic cloud environments
- Integration of wearable technology and artificial intelligence in digital health for remote patient care
- SSLA: a semi-supervised framework for real-time injection detection and anomaly monitoring in cloud-based web applications with real-world implementation and evaluation
- Graph neural network-tracker: a graph neural network-based multi-sensor fusion framework for robust unmanned aerial vehicle tracking
- Placenta segmentation redefined: review of deep learning integration of magnetic resonance imaging and ultrasound imaging
- Comparative evaluation of encoding techniques for workflow process remaining time prediction for cloud applications
- Cloud software code generation via knowledge graphs and multi-modal learning
- SmartTrust: a hybrid deep learning framework for real-time threat detection in cloud environments using Zero-Trust Architecture
- Private cloud bespoke orchestrator: techniques for constructing and operating bespoke-private cloud virtual machine environments for cloud users
- Dynamic scheduling strategies for cloud-based load balancing in parallel and distributed systems
- Energy-efficient deep learning-based intrusion detection system for edge computing: a novel DNN-KDQ model
- Active interaction strategy generation for human-robot collaboration based on trust
- Service function tree mapping of microservices on resource-constrained fog networks
- Optimized hybrid deep learning for cross-linguistic sentiment analysis: a novel approach
- Demystification and near-perfect estimation of minimum gas limit and gas used for Ethereum smart contracts
- Avatars in the educational metaverse
- Correction: Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications
ABSTRACT
Coming soon
