Search
Now showing items 21-30 of 44
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
(
Elsevier B.V.
, 2021 , Article)
Data security is a challenge for end-users of cloud services as the users have no control over their data once it is transmitted to the cloud. A potentially corrupt cloud service provider can obtain the end-users’ data. ...
Threat-specific security risk evaluation in the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ...
Enhanced Beidou user equipment access authentication protocol based on location key
(
Editorial Board of Journal on Communications
, 2022 , Article)
In order to solve the shortcomings of the existing Beidou user equipment access solutions such as prolonged authentication, and in response to the need of user privacy protection, a user equipment access authentication ...
Hybrid Multi-Objective Optimization Approach With Pareto Local Search for Collaborative Truck-Drone Routing Problems Considering Flexible Time Windows
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
The collaboration of drones and trucks for last-mile delivery has attracted much attention. In this paper, we address a collaborative routing problem of the truck-drone system, in which a truck collaborates with multiple ...
Collaborative Truck-Drone Routing for Contactless Parcel Delivery during the Epidemic
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
The COVID-19 pandemic calls for contactless deliveries. To prevent the further spread of the disease and ensure the timely delivery of supplies, this paper investigates a collaborative truck-drone routing problem for ...
Jointly optimized ensemble deep random vector functional link network for semi-supervised classification
(
Elsevier Ltd
, 2022 , Article)
Randomized neural networks have become more and more attractive recently since they use closed-form solutions for parameter training instead of gradient-based approaches. Among them, the random vector functional link network ...
Significant wave height forecasting using hybrid ensemble deep randomized networks with neurons pruning
(
Elsevier Ltd
, 2023 , Article)
The reliable control of wave energy devices highly relies on the forecasts of wave heights. However, the dynamic characteristics and significant fluctuation of waves’ historical data pose challenges to precise predictions. ...
A Voting-Mechanism-Based Ensemble Framework for Constraint Handling Techniques
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Effective constraint handling techniques (CHTs) are of great significance for evolutionary algorithms (EAs) dealing with constrained optimization problems (COPs). To date, many CHTs, such as penalty function, superiority ...
CloudFlow: A data-aware programming model for cloud workflow applications on modern HPC systems
(
Elsevier
, 2015 , Article)
Traditional High-Performance Computing (HPC) based big-data applications are usually constrained by having to move large amount of data to compute facilities for real-time processing purpose. Modern HPC systems, represented ...
Context-aware RAON middleware for opportunistic network
(
Elsevier B.V.
, 2017 , Article)
Application development and deployment on Mobile Ad Hoc Networks (MANET) is a major challenge in the widespread use of MANET. The increasing D2D communication in 5G networks has renewed interest in an effective middleware ...