[HTML][HTML] DLJSF: Data-Locality Aware Job Scheduling IoT tasks in fog-cloud computing environments
Problem statement Nowadays, devices generate copious quantities of high-speed data
streams due to Internet of Things (IoT) applications. For the most part, cloud computing …
streams due to Internet of Things (IoT) applications. For the most part, cloud computing …
[HTML][HTML] M2M communication performance for a noisy channel based on latency-aware source-based LTE network measurements
L Zhang, S Hu, M Trik, S Liang, D Li - Alexandria Engineering Journal, 2024 - Elsevier
Abstract The phrase" Machine-to-Machine"(M2M) communication has gained widespread
usage owing to the growing understanding of the Internet of Things. In the upcoming years, it …
usage owing to the growing understanding of the Internet of Things. In the upcoming years, it …
[HTML][HTML] An efficient approach for multi-label classification based on Advanced Kernel-Based Learning System
MY Saidabad, H Hassanzadeh, SHS Ebrahimi… - Intelligent Systems with …, 2024 - Elsevier
The importance of data quality and quantity cannot be overstated in automatic data analysis
systems. An important factor to take into account is the capability to assign a data item to …
systems. An important factor to take into account is the capability to assign a data item to …
Detection and isolation of brain tumors in cancer patients using neural network techniques in MRI images
M Mir, ZS Madhi, A Hamid AbdulHussein… - Scientific Reports, 2024 - nature.com
MRI imaging primarily focuses on the soft tissues of the human body, typically performed
prior to a patient's transfer to the surgical suite for a medical procedure. However, utilizing …
prior to a patient's transfer to the surgical suite for a medical procedure. However, utilizing …
Deep learning for speaker recognition: A comparative analysis of 1D-CNN and LSTM models using diverse datasets
Speaker recognition is a vital component of identity verification and security systems that has
made significant progress through the use of deep neural networks. This article examines …
made significant progress through the use of deep neural networks. This article examines …
[HTML][HTML] Smart healthcare systems: A new IoT-Fog based disease diagnosis framework for smart healthcare projects
Z Tang, Z Tang, Y Liu, Z Tang, Y Liao - Ain Shams Engineering Journal, 2024 - Elsevier
A new paradigm for supporting medical services, especially beneficial for metropolitan
regions and individuals experiencing homelessness who use technological …
regions and individuals experiencing homelessness who use technological …
Optimization of resources in intelligent electronic health systems based on Internet of Things to predict heart diseases via artificial neural network
Y Liao, Z Tang, K Gao, M Trik - Heliyon, 2024 - cell.com
As a paradigm shift in tandem with the expansion of ICT, smart electronic health systems
hold great promise for enhancing healthcare delivery and illness prevention efforts. These …
hold great promise for enhancing healthcare delivery and illness prevention efforts. These …
A novel approach for energy consumption management in cloud centers based on adaptive fuzzy neural systems
H Huang, Y Wang, Y Cai, H Wang - Cluster Computing, 2024 - Springer
Cloud computing enables global access to tool-based IT services, accommodating a wide
range of applications across consumer, scientific, and commercial sectors, operating on a …
range of applications across consumer, scientific, and commercial sectors, operating on a …
Digital human and embodied intelligence for sports science: advancements, opportunities and prospects
X Suo, W Tang, L Mao, Z Li - The Visual Computer, 2024 - Springer
This paper presents a comprehensive review of state-of-the-art motion capture techniques
for digital human modeling in sports, including traditional optical motion capture systems …
for digital human modeling in sports, including traditional optical motion capture systems …
A two-way trust routing scheme to improve security in fog computing environment
J Wang, Z Luo, C Wang - Cluster Computing, 2024 - Springer
Compliance with security requirements in the fog computing environment is known as an
important phenomenon in maintaining the quality of service due to the dynamic topology …
important phenomenon in maintaining the quality of service due to the dynamic topology …