Intelligent intrusion detection system in smart grid using computational intelligence and machine learning
Smart grid systems enhanced the capability of traditional power networks while being
vulnerable to different types of cyber‐attacks. These vulnerabilities could cause attackers to …
vulnerable to different types of cyber‐attacks. These vulnerabilities could cause attackers to …
Authentication security level and resource optimization of computation offloading in edge computing systems
Edge computing brings computation and storage resources to the edge of the mobile
network to meet strict delay and high demanding applications. However, edge network …
network to meet strict delay and high demanding applications. However, edge network …
A new metaheuristic‐based method for solving the virtual machines migration problem in the green cloud computing
Y Xu, K Abnoosian - Concurrency and Computation: Practice …, 2022 - Wiley Online Library
Cloud computing (CC) provides dynamic hiring of server abilities as scalable virtualized
services to end‐users. However, data center hosting wastes massive amounts of energy …
services to end‐users. However, data center hosting wastes massive amounts of energy …
An Efficient Service-Aware Virtual Machine Scheduling Approach Based on Multi-Objective Evolutionary Algorithm
Service providers tend to deploy application services to several different virtual machines
(VMs) to improve the scalability and manageability of the cloud data center (CDC) …
(VMs) to improve the scalability and manageability of the cloud data center (CDC) …
A Time Delay Prediction Model of 5G Users Based on the BiLSTM Neural Network Optimized by APSO‐SD
X Dang, D He, C **e - Journal of Electrical and Computer …, 2023 - Wiley Online Library
To address the problems of 5G network planning and optimization, a 5G user time delay
prediction model based on the BiLSTM neural network optimized by APSO‐SD is proposed …
prediction model based on the BiLSTM neural network optimized by APSO‐SD is proposed …
Evaluation of Kernel-Level IoT Security and QoS Aware Models from an Empirical Perspective
BS Dhak, PL Ramteke - International Conference on Communication …, 2021 - Springer
Abstract Internet of Things (IoT) based devices have proven to be highly useful during this
pandemic. From home automation to industrial monitoring, these devices have become an …
pandemic. From home automation to industrial monitoring, these devices have become an …
[PDF][PDF] Task scheduling and VM allocation in cloud computing: A survey
Cloud computing is a fast-emerging area with so many benefits for the end users. Many
leading firms make use of cloud mainly to store their huge volume of data and other such …
leading firms make use of cloud mainly to store their huge volume of data and other such …
[ΑΝΑΦΟΡΑ][C] Energy Efficient Hybrid Swarm Intelligence Virtual Machine Consolidation Method
**俊祺, 林伟伟, 石方, **克勤 - Journal of Software, 2021
[ΑΝΑΦΟΡΑ][C] 基于混合群智能的节能虚拟机整合方法
**俊祺, 林伟伟, 石方, **克勤 - 软件学报, 2021