[HTML][HTML] Modern computing: Vision and challenges
Over the past six decades, the computing systems field has experienced significant
transformations, profoundly impacting society with transformational developments, such as …
transformations, profoundly impacting society with transformational developments, such as …
Blockchain-based solutions supporting reliable healthcare for fog computing and Internet of medical things (IoMT) integration
The Internet of Things (IoT) has radically transformed how patient information and
healthcare monitoring are monitored and recorded and has revolutionized the area by …
healthcare monitoring are monitored and recorded and has revolutionized the area by …
Energy-efficient clustering protocol for underwater wireless sensor networks using optimized glowworm swarm optimization
In the past few decades, cutting-edge information and communication technology has been
used in several ways to keep an eye on the marine environment. Underwater wireless …
used in several ways to keep an eye on the marine environment. Underwater wireless …
[HTML][HTML] A comprehensive survey of energy-efficient computing to enable sustainable massive IoT networks
MH Alsharif, AH Kelechi, A Jahid… - Alexandria Engineering …, 2024 - Elsevier
Energy efficiency is a key area of research aimed at achieving sustainable and
environmentally friendly networks. With the rise in data traffic and network congestion, IoT …
environmentally friendly networks. With the rise in data traffic and network congestion, IoT …
Optimization of load balancing and task scheduling in cloud computing environments using artificial neural networks-based binary particle swarm optimization (BPSO)
MI Alghamdi - Sustainability, 2022 - mdpi.com
As more people utilize the cloud, more employment opportunities become available. With
constraints such as a limited make-span, a high utilization rate of available resources …
constraints such as a limited make-span, a high utilization rate of available resources …
Secure sensitive data sharing using RSA and ElGamal cryptographic algorithms with hash functions
With the explosion of connected devices linked to one another, the amount of transmitted
data grows day by day, posing new problems in terms of information security, such as …
data grows day by day, posing new problems in terms of information security, such as …
A security policy protocol for detection and prevention of internet control message protocol attacks in software defined networks
Owing to the latest advancements in networking devices and functionalities, there is a need
to build future intelligent networks that provide intellectualization, activation, and …
to build future intelligent networks that provide intellectualization, activation, and …
Task scheduling in fog environment—Challenges, tools & methodologies: A review
ZJK Abadi, N Mansouri, M Khalouie - Computer Science Review, 2023 - Elsevier
Even though cloud computing offers many advantages, it can be a poor choice sometimes
because of its slow response to existing requests, leading to the need for fog computing …
because of its slow response to existing requests, leading to the need for fog computing …
A machine learning-based framework for the prediction of cervical cancer risk in women
One of the most common types of cancer in women is cervical cancer, a disease which is the
most prevalent in poor nations, with one woman dying from it every two minutes. It has a …
most prevalent in poor nations, with one woman dying from it every two minutes. It has a …
Enhanced security using multiple paths routine scheme in cloud-MANETs
T Hai, J Zhou, Y Lu, D Jawawi, D Wang… - Journal of Cloud …, 2023 - Springer
Abstract Cloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access
and deliver cloud services to MANET users through their smart devices. MANETs is a pool of …
and deliver cloud services to MANET users through their smart devices. MANETs is a pool of …