[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 226, Issue CJun 2024
Reflects downloads up to 13 Jan 2025Bibliometrics
Skip Table Of Content Section
research-article
Cooperative-centrality enabled investigations on edge-based trustworthy framework for cloud focused internet of things
Abstract

Trustworthiness possesses numerous design challenges for the researchers and scientists in the global era of internet of things. The solution to deal with these challenges lies in trust management mechanisms (TMM). The integration of TMM on the ...

research-article
Optimizing the performance of OpenFlow Protocol over QUIC
Abstract

In the last decade, Software-defined networking (SDN) has been an eye-catching network architecture. As the essential protocol of SDN, OpenFlow provides the ability to control switches forwarding plane by the remote controller. Currently, ...

research-article
BRIP: Towards a privacy-preserving, trustworthy, and transparent ride-sharing system with semantic matching powered by blockchain and IPFS
Abstract

This paper introduces a decentralized ride-sharing system called BRIP that utilizes blockchain technology. BRIP addresses various issues commonly associated with centralized ride-sharing such as single points of failure, privacy violations, lack ...

Highlights

  • An enhanced decentralized ride-sharing system, called BRIP, is proposed and a prototype of it is implemented as a decentralized application (DApp) on the top of Ethereum, a real-world public blockchain platform. This enables users to ...

research-article
Blockchain based crowdsourcing framework for Vehicle-to-Vehicle charging
Abstract

Electric Vehicles (EVs) have become a promising solution to entirely replace traditional internal combustion engine vehicles. EV owners face the “Range Anxiety” problem which is the fear that their remaining charge would not be enough to reach ...

research-article
An ensemble maximal feature subset selection for smartphone based human activity recognition
Abstract

Smartphone-based Human Activity Recognition (HAR) uses spatiotemporal time series data collected from a smartphone’s in-built accelerometer, gyroscope, and magnetometer sensor. Real-time HAR datasets such as UCI-HAR and UCI-HAPT extract time and ...

research-article
An energy-efficient asynchronous neighbor discovery algorithm based on cyclic difference set in duty-cycle wireless sensor networks
Abstract

In duty-cycle wireless sensor networks(WSNs), as nodes are not necessarily synchronized, many asynchronous neighbor discovery algorithms have been proposed over the past several years. However, existing algorithms are not strong enough to support ...

review-article
Exploring the integration of edge computing and blockchain IoT: Principles, architectures, security, and applications
Abstract

IoT systems are widely used in various applications, including healthcare, agriculture, manufacturing, and smart cities. However, these systems still have limitations, such as lack of security, high latency, energy inefficiency, the inefficiency ...

Highlights

  • A detailed exploration of the architectural nuances and deployments of the blockchain-based edge IoT.
  • An exhaustive analysis of security necessities, complemented with potential solutions for prevalent security concerns.
  • ...

research-article
Efficient cloud data center: An adaptive framework for dynamic Virtual Machine Consolidation
Abstract

Cloud computing is a thriving and ever-expanding sector in the industry world. This growth has sparked increased interest from organizations seeking to harness its potential. However, the sheer volume of services and offerings in this field has ...

research-article
An efficient mechanism for function scheduling and placement in function as a service edge environment
Abstract

With the advancement of Internet of Things (IoT) applications and the substantial surge in associated traffic, coupled with the rise in demand for low-latency mobile applications, the utilization of remote cloud computing infrastructure has ...

Highlights

  • We investigate resource provisioning and allocation for Function-as-a-Service model in Mobile Edge Computing.
  • We propose a many-to-one assignment mechanism inspired by the school choice problem to minimize the completion time of users’ ...

research-article
Edge caching and computing of video chunks in multi-tier wireless networks
Abstract

This paper proposes a video caching and transcoding strategy for delay-constrained content delivery in multi-tier wireless networks. Particularly for multimedia services whose content can be encoded into multiple quality versions and consists of ...

review-article
Deep Neural Networks meet computation offloading in mobile edge networks: Applications, taxonomy, and open issues
Abstract

Mobile Edge Computing (MEC) is a modern paradigm that involves moving computing and storage resources closer to the network edge, reducing latency, and enabling innovative, delay-sensitive applications. Within MEC, computation offloading refers ...

review-article
A comprehensive survey of smart contract security: State of the art and research directions
Abstract

Future protocols in the digital society will be built on the foundation of smart contracts, which are code and algorithmic contracts. Smart contracts enable all phases of the contracting process without the need for outside parties by using ...

Highlights

  • We introduce the background of Ethereum.
  • Then, the security challenges faced by blockchain smart contracts are proposed.
  • We summarize several types of smart contract security solutions related to the topic of smart contract ...

review-article
Flow optimization strategies in data center networks: A survey
Abstract

In the era of digitization, Data Center Networks (DCN) have emerged as a critical component supporting infrastructure for cloud computing, big data analytics, online services, and more. With the exponential growth in data transmission and ...

Highlights

  • Conducting an extensive literature review to create a cohesive research framework.
  • Thoroughly analyzing the strengths and weaknesses of flow optimization strategies.
  • Suggesting forthcoming trends and expectations to guide research ...

research-article
Digital twin-driven secured edge-private cloud Industrial Internet of Things (IIoT) framework
Abstract

With the growing popularity of Industrial Internet of Things (IIoT) technologies and the recent development of edge private cloud systems to fulfill the demands of industrial environments for high data rates, low latency, and powerful computing ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.