An energy-efficient and deadline-aware workflow scheduling algorithm in the fog and cloud environment

N Khaledian, K Khamforoosh, R Akraminejad… - computing, 2024 - Springer
Abstract The Internet of Things (IoT) is constantly evolving. The variety of IoT applications
has caused new demands to emerge on users' part and competition between computing …

[HTML][HTML] Appropriate budget contingency determination for construction projects: State-of-the-art

T Ammar, M Abdel-Monem, K El-Dash - Alexandria Engineering Journal, 2023 - Elsevier
Contingency is a critical component in the cost estimation process for any construction
project. The contingency reserve considers potential costs related to risks and uncertainties …

[PDF][PDF] Boosted dipper throated optimization algorithm-based Xception neural network for skin cancer diagnosis: An optimal approach

X Tang, FR Sheykhahmad - Heliyon, 2024 - cell.com
Skin cancer is a prevalent form of cancer that necessitates prompt and precise detection.
However, current diagnostic methods for skin cancer are either invasive, time-consuming, or …

Almost periodic fractional fuzzy dynamic equations on timescales: A survey

C Wang, Y Tan, RP Agarwal - Mathematical Methods in the …, 2024 - Wiley Online Library
In this paper, we systematically present some main results of the fractional calculus, almost
periodic functions, fuzzy functions, fuzzy fractional calculus, and almost periodic generalized …

[HTML][HTML] Conormal Product for Intutionistic Anti-Fuzzy Graphs

K Kalaiarasi, L Mahalakshmi, N Kausar… - International Journal of …, 2023 - ijfis.org
This study introduces and analyzes the conormal product of intuitionistic anti-fuzzy graphs
(IAFGs) and analyzes certain fundamental theorems and applications. Further, new notions …

[PDF][PDF] Attack graph-based security metrics: Concept, taxonomy, challenges and open issues

ZJ Al-Araji, S Sakinah Syed Ahmad… - BIO Web of …, 2024 - bio-conferences.org
Context: Security issues have increased recently because of the increased use of
networking. The researchers have proposed many models, approaches, and models, for …

Recognition of Attacks on IoT Devices and Their Prevention Using Deep Learning Methods

BS Rawat, A Srivastava, G Singh… - … on Blockchain and …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) has caused a revolution in many different industries by making it
possible for connected smart devices to communicate with one another effortlessly …