MBCP: Performance analysis of large scale mainstream blockchain consensus protocols

M Kaur, MZ Khan, S Gupta, A Noorwali… - Ieee …, 2021 - ieeexplore.ieee.org
As Blockchain innovation picks up popularity in many areas, it is frequently hailed as a
sound innovation. Because of the decentralization and encryption, many imagine that data …

Current studies and applications of shuffled frog leaping algorithm: a review

BB Maaroof, TA Rashid, JM Abdulla, BA Hassan… - … Methods in Engineering, 2022 - Springer
Abstract Shuffled Frog Leaping Algorithm (SFLA) is one of the most widespread algorithms.
It was developed by Eusuff and Lansey in 2006. SFLA is a population-based metaheuristic …

Optimization of complex system reliability using hybrid grey wolf optimizer

G Negi, A Kumar, S Pant, M Ram - … Making: Applications in …, 2021 - dmame-journal.org
Reliability allocation to increase the total reliability has become a successful way to increase
the efficiency of the complex industrial system designs. A lot of research in the past have …

Task scheduling optimization in heterogeneous cloud computing environments: A hybrid GA-GWO approach

I Behera, S Sobhanayak - Journal of Parallel and Distributed Computing, 2024 - Elsevier
Cloud computing, a technology providing flexible and scalable computing resources, faces a
critical challenge in task scheduling, directly impacting system performance and customer …

Binary improved white shark algorithm for intrusion detection systems

NA Alawad, BH Abed-alguni, MA Al-Betar… - Neural Computing and …, 2023 - Springer
Intrusion Detection (ID) is an essential task in the cyberattacks domain built to secure
Internet applications and networks from malicious actors. The main shortcoming of the …

An efficient optimal security system for intrusion detection in cloud computing environment using hybrid deep learning technique

M Mayuranathan, SK Saravanan, B Muthusenthil… - … in Engineering Software, 2022 - Elsevier
Users have been urged to embrace a cloud-based environment by recent technologies and
advancements. Because of the dispersed nature of cloud solutions, security is a major …

A quality-of-service-aware service composition method in the internet of things using a multi-objective fuzzy-based hybrid algorithm

M Hamzei, S Khandagh, N Jafari Navimipour - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) represents a cutting-edge technical domain, encompassing
billions of intelligent objects capable of bridging the physical and virtual worlds across …

[HTML][HTML] Sustainable task offloading decision using genetic algorithm in sensor mobile edge computing

S Chakraborty, K Mazumdar - Journal of King Saud University-Computer …, 2022 - Elsevier
Propelling energy-constrained sensor tasks to edge servers in Sensor Mobile Edge
Computing (SMEC) subjugates Mobile Devices'(MDs) resource limitation menace. Most of …

Energy-efficient and secure mobile fog-based cloud for the Internet of Things

A Razaque, Y Jararweh, B Alotaibi, M Alotaibi… - Future Generation …, 2022 - Elsevier
The mobile fog-based cloud (MFBC) plays a major role for the Internet of Things (IoT) and is
highly suitable for obtaining virtualized data without additional waiting time. However, the …

Bi-objective service composition and optimal selection for cloud manufacturing with QoS and robustness criteria

Y Gao, B Yang, S Wang, Z Zhang, X Tang - Applied Soft Computing, 2022 - Elsevier
As an important part of cloud manufacturing, service composition and optimal selection
(SCOS) has attracted many scholars' attentions. Although there are a large number of …