Allocation of computing resources based on multi-objective strategy and performance improvement in 5G networks DOI
Qiang Yuan, Zhiyong Liu, Xueying Jiang

et al.

Computer Communications, Journal Year: 2025, Volume and Issue: unknown, P. 108197 - 108197

Published: April 1, 2025

Language: Английский

Applying meta-heuristic dynamic algorithms to maximize impact and discover significant nodes in social networks DOI Creative Commons

Hooman Motevalli,

Edris Khezri,

Hiwa Hassanzadeh

et al.

Social Network Analysis and Mining, Journal Year: 2025, Volume and Issue: 15(1)

Published: March 24, 2025

Language: Английский

Citations

0

An effective method for prospective scheduling of tasks in cloud-fog computing with an energy consumption management approach based on Q-learning DOI
Yan Jin

Engineering Applications of Artificial Intelligence, Journal Year: 2025, Volume and Issue: 151, P. 110705 - 110705

Published: April 3, 2025

Language: Английский

Citations

0

Evolutionary algorithm- based sliding mode control of a photovoltaic/battery system DOI
Jafar Tavoosi, Saeed Danyali, Mohammadamin Shirkhani

et al.

Electric Power Systems Research, Journal Year: 2025, Volume and Issue: 246, P. 111717 - 111717

Published: April 16, 2025

Language: Английский

Citations

0

General models for predicting the liquid thermal conductivity of fatty acid esters based on smart methods DOI Creative Commons
Chou‐Yi Hsu,

Abu Khair Mohammad Mohsin,

R.L. Jhala

et al.

Energy Conversion and Management X, Journal Year: 2025, Volume and Issue: unknown, P. 101023 - 101023

Published: April 1, 2025

Language: Английский

Citations

0

A new intrusion detection method using ensemble classification and feature selection DOI Creative Commons

Pooyan Azizi Doost,

Sadegh Sarhani Moghadam,

Edris Khezri

et al.

Scientific Reports, Journal Year: 2025, Volume and Issue: 15(1)

Published: April 20, 2025

Intrusion Detection Systems (IDS) play a crucial role in ensuring network security by identifying and mitigating cyber threats. This study introduces hybrid intrusion detection approach that integrates Convolutional Neural Networks (CNNs) for feature extraction the Random Forest (RF) algorithm classification. The proposed method enhances accuracy leveraging CNNs to automatically extract relevant features, reducing data dimensionality noise. Subsequently, RF classifier processes these optimized features achieve robust precise To evaluate effectiveness of approach, experiments were conducted on KDD99 UNSW-NB15 datasets. results demonstrate model achieves an 97% precision over 98%, outperforming traditional machine learning-based IDS solutions. These findings highlight potential framework as scalable efficient cybersecurity solution real-world environments.

Language: Английский

Citations

0

Allocation of computing resources based on multi-objective strategy and performance improvement in 5G networks DOI
Qiang Yuan, Zhiyong Liu, Xueying Jiang

et al.

Computer Communications, Journal Year: 2025, Volume and Issue: unknown, P. 108197 - 108197

Published: April 1, 2025

Language: Английский

Citations

0