Joint energy efficiency and network optimization for integrated blockchain-SDN-based internet of things networks DOI
Akram Hakiri, Bassem Sellami, Sadok Ben Yahia

et al.

Future Generation Computer Systems, Journal Year: 2024, Volume and Issue: 163, P. 107519 - 107519

Published: Sept. 4, 2024

Language: Английский

A Joint Optimization of Resource Allocation Management and Multi-Task Offloading in High-Mobility Vehicular Multi-Access Edge Computing Networks DOI
Hong Min, Amir Masoud Rahmani,

Payam Ghaderkourehpaz

et al.

Ad Hoc Networks, Journal Year: 2024, Volume and Issue: 166, P. 103656 - 103656

Published: Sept. 6, 2024

Language: Английский

Citations

7

Feature efficiency in IoMT security: A comprehensive framework for threat detection with DNN and ML DOI
Merve Pınar, A. Aktas, Eyüp Emre Ülkü

et al.

Computers in Biology and Medicine, Journal Year: 2025, Volume and Issue: 186, P. 109603 - 109603

Published: Jan. 1, 2025

Language: Английский

Citations

0

An Optimizing Geo-Distributed Edge Layering with Double Deep Q-Networks for Predictive Mobility-Aware Offloading in Mobile Edge Computing DOI
Amir M. Rahmani, Amir Haider, Saqib Ali

et al.

Ad Hoc Networks, Journal Year: 2025, Volume and Issue: unknown, P. 103804 - 103804

Published: Feb. 1, 2025

Language: Английский

Citations

0

DFDFTr + RAC-DAC: Dense Fusion with Deep Fusion Transformer and Realistic Actor-Critic combined with Decoupled Actor-Critic for end-to-end continuous multi-task robotic arm control DOI
Dang Thi Phuc,

Nguyen Truong Chinh,

Dau Sy Hieu

et al.

Expert Systems with Applications, Journal Year: 2025, Volume and Issue: unknown, P. 126923 - 126923

Published: March 1, 2025

Language: Английский

Citations

0

An end-to-end four tier remote healthcare monitoring framework using edge-cloud computing and redactable blockchain DOI
Naif Alsharabi, Abdulaziz M. Alayba, Gharbi Alshammari

et al.

Computers in Biology and Medicine, Journal Year: 2025, Volume and Issue: 189, P. 109987 - 109987

Published: March 12, 2025

Language: Английский

Citations

0

Self-Learning Adaptive Power Management Scheme for Energy-Efficient IoT-MEC Systems Using Soft Actor-Critic Algorithm DOI
Amir M. Rahmani, Amir Haider, Komeil Moghaddasi

et al.

Internet of Things, Journal Year: 2025, Volume and Issue: unknown, P. 101587 - 101587

Published: March 1, 2025

Language: Английский

Citations

0

Constructability optimization of rebar cages using Hippopotamus Optimization and Double Deep Q-Network DOI

Xinfei Guo,

Yimiao Huang, Shaopeng Zhang

et al.

Automation in Construction, Journal Year: 2025, Volume and Issue: 175, P. 106224 - 106224

Published: April 25, 2025

Language: Английский

Citations

0

A patient-centric blockchain-assisted health information exchange framework with access control DOI
Kausthav Pratim Kalita, Debojit Boro, Dhruba K. Bhattacharyya

et al.

Computers & Electrical Engineering, Journal Year: 2025, Volume and Issue: 124, P. 110308 - 110308

Published: April 17, 2025

Language: Английский

Citations

0

An empirical investigation of blockchain adoption using the privacy calculus approach: mediating role of perceived risks and perceived benefits DOI

Rakesh Naik Vadithe,

Bikrant Kesari,

Subbarao Akkala

et al.

Kybernetes, Journal Year: 2025, Volume and Issue: unknown

Published: April 23, 2025

Purpose This study aims to investigate blockchain adoption through the lens of privacy calculus approach, focusing on roles perceived risks and benefits. Specifically, examines how concerns, complexity compliance influence risk process automation, auditability self-service capability impact Furthermore, it explores mediating benefits in process. Design/methodology/approach Data collected from 616 managers with experience applications, utilizes PLS-SEM analyze hypothesized relationships using SmartPLS 4.0. Findings Key findings reveal that significantly risk, whereas positively Additionally, both directly affect adoption. Mediation analysis highlights mediates effects adoption, while mediate Originality/value contributes growing literature by offering insights into privacy-benefit trade-offs influencing decisions, providing practical implications for developers policymakers design privacy-conscious applications.

Language: Английский

Citations

0

Next-Gen IoT Security using Polar Codes-based Cryptography for Malware Defence through Quantum Self-Attention Neural Network DOI Creative Commons
Swati Kumari

Knowledge-Based Systems, Journal Year: 2025, Volume and Issue: unknown, P. 113716 - 113716

Published: May 1, 2025

Language: Английский

Citations

0