International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering,
Journal Year:
2024,
Volume and Issue:
14(3), P. 3244 - 3244
Published: April 4, 2024
Load
balancing
plays
a
critical
role
in
optimizing
resource
utilization
and
enhancing
performance
cloud
computing
systems.
As
environments
grow
scale
complexity,
efficient
load
mechanisms
become
increasingly
vital.
This
paper
presents
comprehensive
review
of
techniques
systems,
with
focus
on
their
applicability,
advantages,
limitations.
The
encompasses
both
static
dynamic
approaches,
evaluating
effectiveness
addressing
the
challenges
posed
by
infrastructure,
such
as
heterogeneity,
scalability,
variability
workload
demands.
Furthermore,
examines
algorithms
considering
factors
utilization,
response
time,
fault
tolerance,
energy
efficiency.
Additionally,
impact
metrics,
including
throughput,
latency,
is
analyzed.
aims
to
provide
insights
into
state-of-the-art
strategies
serve
valuable
for
researchers,
practitioners,
system
designers
involved
development
optimization
Sustainability,
Journal Year:
2023,
Volume and Issue:
15(16), P. 12406 - 12406
Published: Aug. 15, 2023
With
the
swift
pace
of
development
artificial
intelligence
(AI)
in
diverse
spheres,
medical
and
healthcare
fields
are
utilizing
machine
learning
(ML)
methodologies
numerous
inventive
ways.
ML
techniques
have
outstripped
formerly
state-of-the-art
practices,
yielding
faster
more
precise
outcomes.
Healthcare
practitioners
increasingly
drawn
to
this
technology
their
initiatives
relating
Internet
Behavior
(IoB).
This
area
research
scrutinizes
rationales,
approaches,
timing
human
adoption,
encompassing
domains
Things
(IoT),
behavioral
science,
edge
analytics.
The
significance
applications
based
on
IoB
stems
from
its
ability
analyze
interpret
copious
amounts
complex
data
instantly,
providing
innovative
perspectives
that
can
enhance
outcomes
boost
efficiency
IoB-based
procedures
thus
aid
diagnoses,
treatment
protocols,
clinical
decision
making.
As
a
result
inadequacy
thorough
inquiry
into
employment
ML-based
approaches
context
using
for
applications,
we
conducted
study
subject
matter,
introducing
novel
taxonomy
underscores
need
employ
each
method
distinctively.
objective
mind,
classified
cutting-edge
solutions
challenges
five
categories,
which
convolutional
neural
networks
(CNNs),
recurrent
(RNNs),
deep
(DNNs),
multilayer
perceptions
(MLPs),
hybrid
methods.
In
order
delve
deeper,
systematic
literature
review
(SLR)
examined
critical
factors,
such
as
primary
concept,
benefits,
drawbacks,
simulation
environment,
datasets.
Subsequently,
highlighted
pioneering
studies
issues.
Moreover,
several
related
implementation
medicine
been
tackled,
thereby
gradually
fostering
further
endeavors
health
studies.
Our
findings
indicated
Tensorflow
was
most
commonly
utilized
setting,
accounting
24%
proposed
by
researchers.
Additionally,
accuracy
deemed
be
crucial
parameter
majority
papers.
Cognitive Computation,
Journal Year:
2024,
Volume and Issue:
16(3), P. 1073 - 1091
Published: Jan. 26, 2024
Abstract
In
recent
years,
the
proliferation
of
deep
learning
(DL)
techniques
has
given
rise
to
a
significant
challenge
in
form
deepfake
videos,
posing
grave
threat
authenticity
media
content.
With
rapid
advancement
DL
technology,
creation
convincingly
realistic
videos
become
increasingly
prevalent,
raising
serious
concerns
about
potential
misuse
such
Deepfakes
have
undermine
trust
visual
media,
with
implications
for
fields
as
diverse
journalism,
entertainment,
and
security.
This
study
presents
an
innovative
solution
by
harnessing
blockchain-based
federated
(FL)
address
this
issue,
focusing
on
preserving
data
source
anonymity.
The
approach
combines
strengths
SegCaps
convolutional
neural
network
(CNN)
methods
improved
image
feature
extraction,
followed
capsule
(CN)
training
enhance
generalization.
A
novel
normalization
technique
is
introduced
tackle
heterogeneity
stemming
from
global
sources.
Moreover,
transfer
(TL)
preprocessing
are
deployed
elevate
performance.
These
efforts
culminate
collaborative
model
zfacilitated
blockchain
FL
while
maintaining
utmost
confidentiality
effectiveness
our
methodology
rigorously
tested
validated
through
extensive
experiments.
experiments
reveal
substantial
improvement
accuracy,
impressive
average
increase
6.6%
compared
six
benchmark
models.
Furthermore,
demonstrates
5.1%
enhancement
area
under
curve
(AUC)
metric,
underscoring
its
ability
outperform
existing
detection
methods.
results
substantiate
proposed
countering
conclusion,
represents
promising
avenue
advancing
detection.
By
leveraging
resources
power
we
critical
need
As
continues
grow,
comprehensive
provides
effective
means
protect
integrity
trustworthiness
far-reaching
both
industry
society.
work
stands
step
toward
menace
content
rapidly
evolving
digital
landscape.
International Journal of Communication Systems,
Journal Year:
2024,
Volume and Issue:
37(15)
Published: July 15, 2024
Summary
The
latest
developments
in
the
industrial
Internet
of
things
(IIoT)
have
opened
up
a
collection
possibilities
for
many
industries.
To
solve
massive
IIoT
data
security
and
efficiency
problems,
potential
approach
is
considered
to
satisfy
main
needs
IIoT,
such
as
high
throughput,
security,
efficiency,
which
named
blockchain.
blockchain
mechanism
significant
boosting
protection
performance.
In
quest
amplify
capabilities
blockchain‐based
pivotal
role
accorded
Glowworm
Swarm
Optimization
(GSO)
algorithm.
Inspired
by
collaborative
brilliance
glowworms
nature,
GSO
algorithm
offers
unique
harmonizing
these
conflicting
aims.
This
paper
proposes
new
improve
performance
optimization
using
due
blockchain's
contradictory
objectives.
proposed
system
addresses
scalability
challenges
typically
associated
with
technology
efficiently
managing
interactions
among
nodes
dynamically
adapting
network
demands.
optimizes
allocation
resources
decision‐making,
reducing
inefficiencies
bottlenecks.
method
demonstrates
considerable
improvements
through
extensive
simulations
compared
traditional
algorithms,
offering
more
scalable
efficient
solution
applications
context
IIoT.
simulation
computational
study
shown
that
considerably
improves
objective
function
systems'
algorithms.
It
provides
secure
systems
industries
corporations.
Sensors,
Journal Year:
2025,
Volume and Issue:
25(4), P. 1258 - 1258
Published: Feb. 19, 2025
The
exponential
growth
of
wireless
traffic
has
imposed
new
technical
challenges
on
the
Internet
and
defined
approaches
to
dealing
with
its
intensive
use.
Caching,
especially
cooperative
caching,
become
a
revolutionary
paradigm
shift
advance
environments
based
technologies
enable
efficient
data
distribution
support
mobility,
scalability,
manageability
networks.
Mobile
ad
hoc
networks
(MANETs),
mesh
(WMNs),
Wireless
Sensor
Networks
(WSNs),
Vehicular
(VANETs)
have
adopted
caching
practices
overcome
these
hurdles
progressively.
In
this
paper,
we
discuss
problems
issues
in
current
paradigms
as
well
spotlight
versatile
potential
solution
increasing
complications
We
classify
multiple
schemes
distinct
communication
contexts
highlight
advantages
applicability.
Moreover,
identify
research
directions
further
study
enhance
mechanisms
concerning
This
extensive
review
offers
useful
findings
design
sound
strategies
pursuit
enhancing
next-generation
Heliyon,
Journal Year:
2024,
Volume and Issue:
10(9), P. e29916 - e29916
Published: April 22, 2024
With
the
rapid
development
of
Internet
Things
(IoT)
technology,
Terminal
Devices
(TDs)
are
more
inclined
to
offload
computing
tasks
higher-performance
servers,
thereby
solving
problems
insufficient
capacity
and
battery
consumption
TD.
The
emergence
Multi-access
Edge
Computing
(MEC)
technology
provides
new
opportunities
for
IoT
task
offloading.
It
allows
TDs
access
networks
through
multiple
communication
technologies
supports
mobility
terminal
devices.
Review
studies
on
offloading
MEC
have
been
extensive,
but
none
them
focus
in
MEC.
To
fill
this
gap,
paper
a
comprehensive
in-depth
understanding
algorithms
mechanisms
network.
For
each
paper,
main
solved
by
mechanism,
technical
classification,
evaluation
methods,
supported
parameters
extracted
analyzed.
Furthermore,
shortcomings
current
research
future
trends
discussed.
This
review
will
help
potential
researchers
quickly
understand
panorama
approaches
find
appropriate
paths.
IEEE Access,
Journal Year:
2024,
Volume and Issue:
12, P. 76606 - 76633
Published: Jan. 1, 2024
The
next
generation
(6G)
wireless
communication
technology
has
super
advantages
in
high
transmission
rates
scenarios.
Internet
of
Things
(IoT)
been
applied
recent
years
due
to
its
wide
connection.
However,
effective
resource
optimization
methods
must
be
analyzed
meet
the
requirements
key
performance
indicators
6G
IoT
networks.
This
paper
discusses
a
general
investigation
strategies
system.
study
aims
find
main
solutions
optimize
network
performance.
First,
an
overall
summary
current
research
is
preferred
latency,
reliability,
Energy
Efficiency
(EE),
Spectrum
(SE),
bandwidth
utilization
efficiency,
rate,
and
power
efficiency.
Second,
we
propose
multi-indicator
tradeoff
associated
with
latest
approaches
investigate
optimal
strategies.
Furthermore,
show
limitations
discuss
future
works
for
devices
communication.
Our
survey
help
researchers
using
advanced
techniques.