Locality sensitive hashing-aware fruit fly optimization algorithm and its application in edge server placement (Englisch)
Freier Zugriff
- Neue Suche nach: Cao, Qian
- Neue Suche nach: Liu, Bo
- Neue Suche nach: Jin, Ying
- Neue Suche nach: Cao, Qian
- Neue Suche nach: Liu, Bo
- Neue Suche nach: Jin, Ying
In:
Journal of Cloud Computing
: Advances, Systems and Applications
;
11
, 1
;
2022
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:Locality sensitive hashing-aware fruit fly optimization algorithm and its application in edge server placement
-
Weitere Titelangaben:J Cloud Comp
-
Beteiligte:
-
Erschienen in:Journal of Cloud Computing : Advances, Systems and Applications ; 11, 1
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin/Heidelberg
-
Erscheinungsdatum:30.08.2022
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Lizenzbestimmungen:
-
Datenquelle:
Inhaltsverzeichnis – Band 11, Ausgabe 1
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
-
Fog computing application of cyber-physical models of IoT devices with symbolic approximation algorithmsChoi, Deok-Kee et al. | 2022
-
Bearing fault diagnosis method based on improved Siamese neural network with small sampleZhao, Xiaoping / Ma, Mengyao / Shao, Fan et al. | 2022
-
A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection techniqueZhou, Qian / Lai, Chengzhe / Guo, Qili / Ma, Haoyan / Zheng, Dong et al. | 2022
-
Private anomaly detection of student health conditions based on wearable sensors in mobile cloud computingXie, Yu / Zhang, Kuilin / Kou, Huaizhen / Mokarram, Mohammad Jafar et al. | 2022
-
Research on virtual machine consolidation strategy based on combined prediction and energy-aware in cloud computing platformWang, Jinjiang / Gu, Hangyu / Yu, Junyang / Song, Yixin / He, Xin / Song, Yalin et al. | 2022
-
Improving cloud efficiency through optimized resource allocation technique for load balancing using LSTM machine learning algorithmAshawa, Moses / Douglas, Oyakhire / Osamor, Jude / Jackie, Riley et al. | 2022
-
MF-GCN-LSTM: a cloud-edge distributed framework for key positions prediction in grid projectsHuang, Shaoyuan / Zhang, Yuxi / Peng, Guozheng / Zhao, Juan / Zhu, Keping / Zhang, Heng / Wang, Xiaofei et al. | 2022
-
Complex event processing for physical and cyber security in datacentres - recent progress, challenges and recommendationsAlaghbari, Khaled A. / Saad, Mohamad Hanif Md / Hussain, Aini / Alam, Muhammad Raisul et al. | 2022
-
Serverless computing: a security perspectiveMarin, Eduard / Perino, Diego / Di Pietro, Roberto et al. | 2022
-
Federated learning in cloud-edge collaborative architecture: key technologies, applications and challengesBao, Guanming / Guo, Ping et al. | 2022
-
A trusted de-swinging k-anonymity scheme for location privacy protectionYang, Manxiang / Ye, Baopeng / Chen, Yuling / Li, Tao / Yang, Yixian / Qian, Xiaobin / Yu, Xiaomei et al. | 2022
-
Identity-based remote data checking with a designated verifierJi, Yanyan / Shao, Bilin / Chang, Jinyong / Xu, Maozhi / Xue, Rui et al. | 2022
-
Reinforcement learning empowered multi-AGV offloading scheduling in edge-cloud IIoTLiu, Peng / Liu, Zhe / Wang, Ji / Wu, Zifu / Li, Peng / Lu, Huijuan et al. | 2022
-
Job scheduling problem in fog-cloud-based environment using reinforced social spider optimizationKuppusamy, P. / Kumari, N. Marline Joys / Alghamdi, Wael Y. / Alyami, Hashem / Ramalingam, Rajakumar / Javed, Abdul Rehman / Rashid, Mamoon et al. | 2022
-
CONTAIN4n6: a systematic evaluation of container artifactsMishra, Anand K. / Pilli, Emmanuel S. / Govil, Mahesh C. et al. | 2022
-
BTP: automatic identification and prediction of tasks in data center networksZou, Shaojun / Ji, Wei / Huang, Jiawei et al. | 2022
-
Software architecture for pervasive critical health monitoring system using fog computingIlyas, Abeera / Alatawi, Mohammed Naif / Hamid, Yasir / Mahfooz, Saeed / Zada, Islam / Gohar, Neelam / Shah, Mohd Asif et al. | 2022
-
Improved Jellyfish Algorithm-based multi-aspect task scheduling model for IoT tasks over fog integrated cloud environmentJangu, Nupur / Raza, Zahid et al. | 2022
-
Correction: Violence detection approach based on cloud data and Neutrosophic cognitive mapsWajid, Mohammad Saif / Terashima-Marin, Hugo / Paul Rad, Peyman Najafrad / Wajid, Mohd Anas et al. | 2022
-
Low-rate Denial of Service attack detection method based on time-frequency characteristicsFu, Yu / Duan, Xueyuan / Wang, Kun / Li, Bin et al. | 2022
-
Future of industry 5.0 in society: human-centric solutions, challenges and prospective research areasAdel, Amr et al. | 2022
-
Deep Reinforcement Learning-Based Workload Scheduling for Edge ComputingZheng, Tao / Wan, Jian / Zhang, Jilin / Jiang, Congfeng et al. | 2022
-
Automated all in one misspelling detection and correction system for Ethiopian languagesDemilie, Wubetu Barud / Salau, Ayodeji Olalekan et al. | 2022
-
Real-time trajectory privacy protection based on improved differential privacy method and deep learning modelXiong, Jing / Zhu, Hong et al. | 2022
-
Defect knowledge graph construction and application in multi-cloud IoTYang, Wenqing / Li, Xiaochao / Wang, Peng / Hou, Jun / Li, Qianmu / Zhang, Nan et al. | 2022
-
Cost-effective land cover classification for remote sensing imagesLi, Dongwei / Wang, Shuliang / He, Qiang / Yang, Yun et al. | 2022
-
Distributed reinforcement learning-based memory allocation for edge-PLCs in industrial IoTFu, Tingting / Peng, Yanjun / Liu, Peng / Lao, Haksrun / Wan, Shaohua et al. | 2022
-
Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithmShitharth, S / Alotaibi, Fahad S. / Manoharan, Hariprasath / Khadidos, Adil O. / Alyoubi, Khaled H. / Alshareef, Abdulrhman M. et al. | 2022
-
A systematic review of the purposes of Blockchain and fog computing integration: classification and open issuesAlzoubi, Yehia Ibrahim / Gill, Asif / Mishra, Alok et al. | 2022
-
Task partitioning and offloading in IoT cloud-edge collaborative computing framework: a surveyChen, Haiming / Qin, Wei / Wang, Lei et al. | 2022
-
A novel vehicular task deployment method in hybrid MECXu, Xifeng / Xia, Yunni / Zeng, Feng / Li, Fan / Xie, Hong / Fu, Xiaodong / Wang, Mengdi et al. | 2022
-
Task offloading in hybrid-decision-based multi-cloud computing network: a cooperative multi-agent deep reinforcement learningChen, Juan / Chen, Peng / Niu, Xianhua / Wu, Zongling / Xiong, Ling / Shi, Canghong et al. | 2022
-
Security scheduling and transaction mechanism of virtual power plants based on dual blockchainsZhang, Xiaohong / Song, Zilong / Moshayedi, Ata Jahangir et al. | 2022
-
Multi-Recipient encryption with keyword search without pairing for cloud storageYang, Ningbin / Zhou, Quan / Huang, Qiong / Tang, Chunming et al. | 2022
-
A maturity model for AI-empowered cloud-native databases: from the perspective of resource managementFeng, Xiaoyue / Guo, Chaopeng / Jiao, Tianzhe / Song, Jie et al. | 2022
-
Improving datacenter utilization through containerized service-based architectureMulahuwaish, Aos / Korbel, Shane / Qolomany, Basheer et al. | 2022
-
Cloud failure prediction based on traditional machine learning and deep learningTengku Asmawi, Tengku Nazmi / Ismail, Azlan / Shen, Jun et al. | 2022
-
Efficient and scalable patients clustering based on medical big data in cloud platformZhou, Yongsheng / Varzaneh, Majid Ghani et al. | 2022
-
Voice spoofing countermeasure for voice replay attacks using deep learningZhou, Jincheng / Hai, Tao / Jawawi, Dayang N. A. / Wang, Dan / Ibeke, Ebuka / Biamba, Cresantus et al. | 2022
-
An enhanced encryption-based security framework in the CPS CloudPriyadarshini, R. / Quadir Md, Abdul / Rajendran, N. / Neelanarayanan, V. / Sabireen, H. et al. | 2022
-
A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualizationUllah, Farhan / Srivastava, Gautam / Ullah, Shamsher et al. | 2022
-
Cloud-based deep learning-assisted system for diagnosis of sports injuriesWu, Xiaoe / Zhou, Jincheng / Zheng, Maoxing / Chen, Shanwei / Wang, Dan / Anajemba, Joseph / Zhang, Guangnan / Abdelhaq, Maha / Alsaqour, Raed / Uddin, Mueen et al. | 2022
-
A multi-dimensional extensible cloud-native service stack for enterprisesLin, Jian / Xie, Dongming / Huang, Jinjun / Liao, Zinan / Ye, Long et al. | 2022
-
Cloud-based blockchain technology to identify counterfeitsMani, Vinodhini / Prakash, M. / Lai, Wen Cheng et al. | 2022
-
Energy-efficient allocation for multiple tasks in mobile edge computingLiu, Jun / Liu, Xi et al. | 2022
-
AWESOME: an auction and witness enhanced SLA model for decentralized cloud marketplacesShi, Zeshun / Ivankovic, Veno / Farshidi, Siamak / Surbiryala, Jayachander / Zhou, Huan / Zhao, Zhiming et al. | 2022
-
A systematic review on effective energy utilization management strategies in cloud data centersPanwar, Suraj Singh / Rauthan, M. M. S. / Barthwal, Varun et al. | 2022
-
Application of deterministic, stochastic, and hybrid methods for cloud provider selectionde Moraes, Lucas Borges / Parpinelli, Rafael Stubs / Fiorese, Adriano et al. | 2022
-
DSTS: A hybrid optimal and deep learning for dynamic scalable task scheduling on container cloud environmentMuniswamy, Saravanan / Vignesh, Radhakrishnan et al. | 2022
-
Locality sensitive hashing-aware fruit fly optimization algorithm and its application in edge server placementCao, Qian / Liu, Bo / Jin, Ying et al. | 2022
-
CLQLMRS: improving cache locality in MapReduce job scheduling using Q-learningGhazali, Rana / Adabi, Sahar / Rezaee, Ali / Down, Douglas G. / Movaghar, Ali et al. | 2022
-
Cloud based evaluation of databases for stock market dataSingh, Baldeep / Martyr, Randall / Medland, Thomas / Astin, Jamie / Hunter, Gordon / Nebel, Jean-Christophe et al. | 2022
-
Research on unsupervised anomaly data detection method based on improved automatic encoder and Gaussian mixture modelLiu, Xiangyu / Zhu, Shibing / Yang, Fan / Liang, Shengjun et al. | 2022
-
A designated verifier multi-signature scheme in multi-cloudsTan, Chaoyue / Chen, Yuling / Wu, Yongtang / He, Xiaochuan / Li, Tao et al. | 2022
-
Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT)Qayyum, Tariq / Trabelsi, Zouheir / Waqar Malik, Asad / Hayawi, Kadhim et al. | 2022
-
In-depth analysis and open challenges of Mist ComputingLópez Escobar, Juan José / Díaz Redondo, Rebeca P. / Gil-Castiñeira, Felipe et al. | 2022
-
Efficient 3D object recognition in mobile edge environmentSong, Mofei / Guo, Qi et al. | 2022
-
PMHE: a wearable medical sensor assisted framework for health care based on blockchain and privacy computingZhao, Jindong / Wang, Wenshuo / Wang, Dan / Wang, Xuan / Mu, Chunxiao et al. | 2022
-
KeyPIn – mitigating the free rider problem in the distributed cloud based on Key, Participation, and IncentivePal, Doyel / Khethavath, Praveen / Thomas, Johnson P. / Mangla, Utpal et al. | 2022
-
Improved firefly algorithm with courtship learning for unrelated parallel machine scheduling problem with sequence-dependent setup timesHuang, Xingwang / Chen, Lingqing / Zhang, Yuxin / Su, Shubin / Lin, Yangbin / Cao, Xuhui et al. | 2022
-
Cloud-based bug tracking software defects analysis using deep learningHai, Tao / Zhou, Jincheng / Li, Ning / Jain, Sanjiv Kumar / Agrawal, Shweta / Dhaou, Imed Ben et al. | 2022
-
Tourism cloud management system: the impact of smart tourismYin, Fang / Yin, Xiong / Zhou, Jincheng / Zhang, Xinli / Zhang, Ruihua / Ibeke, Ebuka / Iwendi, Marvellous GodsPraise / Shah, Mohammad et al. | 2022
-
Collaborative task offloading and resource allocation with hybrid energy supply for UAV-assisted multi-cloudsZhou, Yu / Ge, Hui / Ma, Bowen / Zhang, Shuhang / Huang, Jiwei et al. | 2022
-
A collaborative computation and dependency-aware task offloading method for vehicular edge computing: a reinforcement learning approachLiu, Guozhi / Dai, Fei / Huang, Bi / Qiang, Zhenping / Wang, Shuai / Li, Lecheng et al. | 2022
-
An efficient quality of services based wireless sensor network for anomaly detection using soft computing approachesMittal, Mohit / Kobielnik, Martyna / Gupta, Swadha / Cheng, Xiaochun / Wozniak, Marcin et al. | 2022
-
Cloud-based multiclass anomaly detection and categorization using ensemble learningShahzad, Faisal / Mannan, Abdul / Javed, Abdul Rehman / Almadhor, Ahmad S. / Baker, Thar / Al-Jumeily OBE, Dhiya et al. | 2022
-
Secure routing protocol based on dynamic reputation and load balancing in wireless mesh networksYuan, Xiaogang / Chen, Yipiao et al. | 2022
-
NIDD: an intelligent network intrusion detection model for nursing homesZhou, Feng / Du, Xin / Li, Wenli / Lu, Zhihui / Wu, Jie et al. | 2022
-
Violence Detection Approach based on Cloud Data and Neutrosophic Cognitive MapsWajid, Mohammad Saif / Terashima-Marin, Hugo / Paul Rad, Peyman Najafirad / Wajid, Mohd Anas et al. | 2022
-
The least-used key selection method for information retrieval in large-scale Cloud-based service repositoriesGu, Jiayan / Anjum, Ashiq / Wu, Yan / Liu, Lu / Panneerselvam, John / Lu, Yao / Yuan, Bo et al. | 2022
-
Research on influencing factors of artificial intelligence multi-cloud scheduling applied talent training based on DEMATEL-TAISMBian, Yi-jie / Xie, Lu / Li, Jing-qi et al. | 2022
-
RDPNet: a single-path lightweight CNN with re-parameterization for CPU-type edge devicesXu, Jiarui / Zhao, Yufeng / Xu, Fei et al. | 2022
-
Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messagesFerraz Junior, Norisvaldo / Silva, Anderson A.A. / Guelfi, Adilson E. / Kofuji, Sergio T. et al. | 2022
-
A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaosLiu, Zilong / Li, Jingbing / Ai, Yang / Zheng, Yuancai / Liu, Jing et al. | 2022
-
A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC systemMawgoud, Ahmed A. / Taha, Mohamed Hamed N. / Abu-Talleb, Amr / Kotb, Amira et al. | 2022
-
Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environmentsHsu, Chingfang / Harn, Lein / Xia, Zhe / Bai, Linyan / Zhang, Ze et al. | 2022
-
Fintech application on banking stability using Big Data of an emerging economyYin, Fang / Jiao, Xiaomei / Zhou, Jincheng / Yin, Xiong / Ibeke, Ebuka / Iwendi, Marvellous GodsPraise / Biamba, Cresantus et al. | 2022
-
Scalability resilience framework using application-level fault injection for cloud-based software servicesAl-Said Ahmad, Amro / Andras, Peter et al. | 2022
-
Look-ahead energy efficient VM allocation approach for data centersÇağlar, İlksen / Altılar, Deniz Turgay et al. | 2022
-
Congestion aware low power on chip protocols with network on chip with cloud securityPonnan, Suresh / Kumar, Tikkireddi Aditya / VS, Hemakumar / Natarajan, Sakthieswaran / Shah, Mohd Asif et al. | 2022
-
Dynamic resource provisioning and secured file sharing using virtualization in cloud azurePerumal, Kumaresan / Mohan, Senthilkumar / Frnda, Jaroslav / Divakarachari, Parameshachari Bidare et al. | 2022
-
Privacy-aware and Efficient Student Clustering for Sport Training with Hash in Cloud EnvironmentDiao, Guoyan / Liu, Fang / Zuo, Zhikai / Moghimi, Mohammad Kazem et al. | 2022
-
Quality assurance awareness in higher education in China: big data challengesZhang, Ruihua / Zhou, Jincheng / Hai, Tao / Zhang, Shixue / Iwendi, Marvellous / Biamba, Cresantus / Anumbe, Noble et al. | 2022
-
A service composition method using improved hybrid teaching learning optimization algorithm in cloud manufacturingZeng, Jun / Yao, Juan / Gao, Min / Wen, Junhao et al. | 2022