A Flawless QoS Aware Task Offloading in IoT Driven Edge Computing System using Chebyshev Based Sand Cat Swarm Optimization DOI Creative Commons

V. V. R. Maheswara Rao,

Shiva Shankar Reddy,

N Silpa

и другие.

Journal of Grid Computing, Год журнала: 2025, Номер 23(1)

Опубликована: Янв. 20, 2025

Язык: Английский

IPM-Model: AI and metaheuristic-enabled face recognition using image partial matching for multimedia forensics investigation with genetic algorithm DOI
Abdullah Ayub Khan, Aftab Ahmed Shaikh, Zaffar Ahmed Shaikh

и другие.

Multimedia Tools and Applications, Год журнала: 2022, Номер 81(17), С. 23533 - 23549

Опубликована: Март 18, 2022

Язык: Английский

Процитировано

37

Blockchain Hyperledger with Non-Linear Machine Learning: A Novel and Secure Educational Accreditation Registration and Distributed Ledger Preservation Architecture DOI Creative Commons
Zaffar Ahmed Shaikh, Abdullah Ayub Khan, Лаура Байтенова

и другие.

Applied Sciences, Год журнала: 2022, Номер 12(5), С. 2534 - 2534

Опубликована: Фев. 28, 2022

This paper proposes a novel and secure blockchain hyperledger sawtooth-enabled consortium analytical model for smart educational accreditation credential evaluation. Indeed, candidate academic credentials are generated, verified, validated by the universities transmitted to Higher Education Department (HED). The objective is enable procedure of verification analyze tamper-proof forged records before validation. For this reason, we designed created an investigate individual collected from examine candidates’ credibility using machine learning techniques maintain all these aspects analysis addresses in distributed storage with hash-encryption (SHA-256) network, which runs on peer-to-peer (P2P) structure. In proposed model, deployed mechanism examiner analyst processes protection criteria, referred as chaincodes or contracts. These automate schedule, generation, verification, validation, monitoring overall nodes’ transactions. include registration associated university (candidateReg()), certificate-related update (CIssuanceTrans()), every node’s transactions preservation immutable (ULedgerAV()) further investigations. simulates benchmark dataset. result shows merit our model. Through extensive simulations, blockchain-enabled provides robust performance terms management problems.

Язык: Английский

Процитировано

36

The Effect of Golden Ratio-Based Capital Structure on Firm’s Financial Performance DOI Open Access
Halkawt Ismail Mohammed Amin, Kemal Çek

Sustainability, Год журнала: 2023, Номер 15(9), С. 7424 - 7424

Опубликована: Апрель 30, 2023

This study aims to apply the golden ratio capital structure of non-financial institutions in France and United Kingdom find effect ratio’s deviation from on financial performance. A is an irrational number with approximate value 1.618. In this paper, was applied develop assumption that firm should use debt at a percentage 61.8% equity 38.2%, which deviates variables. The final sample consisted 150 institution firms 200 U.K. between 2002 2021. addition, general method movement (GMM) chosen estimate variables deviating firms’ results show when uses 38.2% its structure, it can have positive significant impact performance both However, debt-to-equity deviated had negative statistically countries’ TOBQ, EPS, ROA, ROE. Moreover, adoption IFRS positively significantly UK. Generally, managers are encouraged their structure. 61.8%, depending measurement demanded.

Язык: Английский

Процитировано

21

A Review of Blockchain Technology in Knowledge-Defined Networking, Its Application, Benefits, and Challenges DOI Creative Commons
Patikiri Arachchige Don Shehan Nilmantha Wijesekara, Subodha Gunawardena

Network, Год журнала: 2023, Номер 3(3), С. 343 - 421

Опубликована: Авг. 30, 2023

Knowledge-Defined Networking (KDN) necessarily consists of a knowledge plane for the generation knowledge, typically using machine learning techniques, and dissemination in order to make knowledge-driven intelligent network decisions. In one way, KDN can be recognized as Software-Defined (SDN), having additional management planes. On other hand, encapsulates all knowledge-/intelligence-/ cognition-/machine learning-driven networks, emphasizing (KG) making decisions, unlike SDN, which emphasizes logical decoupling control plane. Blockchain is technology created secure trustworthy decentralized transaction storage sequence immutable linked transactions. The decision-making trustworthiness system reliant on data, AI model sharing. To this point, may use capabilities blockchain sharing, transactions prevent repudiation are immutable, pseudo-anonymous, optionally encrypted, reliable, access-controlled, untampered, protect sensitivity, integrity, legitimacy sharing entities. Furthermore, has been integrated with knowledge-based networks traffic optimization, resource administration, access control, protecting privacy, filtering, anomaly or intrusion detection, virtualization, massive data analysis, edge cloud computing, center networking. Despite fact that many academics have employed concept cognitive achieve various objectives, we also identify challenges such high energy consumption, scalability issues, difficulty processing big etc. act barriers integrating two concepts together. Academicians not yet reviewed blockchain-based solutions diverse application categories knowledge-defined general, consider techniques learning, fuzzy logic, meta-heuristics. Therefore, article fills void content literature by first reviewing existing applications analyzing comparing works, describing advantages difficulties systems KDN, and, finally, providing propositions based identified then presenting prospects future.

Язык: Английский

Процитировано

19

BIoMT Modular Infrastructure: The Recent Challenges, Issues, and Limitations in Blockchain Hyperledger-Enabled E-Healthcare Application DOI Creative Commons
Zaffar Ahmed Shaikh, Abdullah Ayub Khan, Lin Teng

и другие.

Wireless Communications and Mobile Computing, Год журнала: 2022, Номер 2022, С. 1 - 14

Опубликована: Сен. 21, 2022

This paper presents a layered hierarchy that depicts the progressive relationship between data, information, knowledge, and wisdom. To begin with, data is gathered organized into information. Information gathered, filtered, refined, put through an investigation process to create knowledge. Wisdom attained after knowledge discovery of filtration aggregation experience. The in domain e-healthcare necessitates higher scheduling costs for collection, processing wisdom, management, which also insecure untrustworthy medical service. industry faces difficult problem providing collected integrity, information reliability, trustworthiness service relationships face increasing number day-to-day records. blockchain consortium hyperledger (fabric) has been used this act as bridge bridges gap electronic wisdom (DIKW) movement processes by enabling schedule management security transparency. For privacy, DIKW-ledger, such patients’ consultancy availing services, personal records, appointments, treatment details, other health-related transactions, fabric-enabled efficient architecture proposed. proposed creates two networks: public network stakeholders exchange agree on specific activities before being preserved distributed storage (read-only record registration) private complete DIKW management. We designed created smart contracts purpose, well use-case diagrams describe overall execution process. architectural solution provides more provenance, procedures immutably preserve ledger permissioned hash-encrypted structure.

Язык: Английский

Процитировано

28

Trusted and Secure Blockchain-Based Architecture for Internet-of-Medical-Things DOI Open Access
Aniruddha Bhattacharjya, Kamil Kozdrój, Grzegorz Bazydło

и другие.

Electronics, Год журнала: 2022, Номер 11(16), С. 2560 - 2560

Опубликована: Авг. 16, 2022

The Internet of Medical Things (IoMT) global market has grown and developed significantly in recent years, the number IoMT devices is increasing every year. systems are now very popular have become part our everyday life. However, such should be properly protected to preventing unauthorized access devices. One most security methods that additionally relies on real-time communication Blockchain. Moreover, a technique can supported by Trusted Third Party (TTP), which guarantees data immutability transparency. research industrial community predicted proliferation Blockchain-based (BIoMT), for providing security, privacy, effective insurance processing. A connected environment comprises some unique features form sensors capture measure, recognize classify, assess risk, notify, make conclusions, take action. Distributed also due combination fact Blockchain cannot tampered with Peer-to-Peer (P2P) technique, especially compared traditional cloud-based techniques where reliance centralized cloud makes it somewhat vulnerable. This paper proposes oriented applications focus maintaining Confidentiality, Integrity, Availability (the CIA triad) system. proposed solution toward trusted secure communication. presented method illustrated an example hospital application. Finally, aspects approach studied analyzed detail.

Язык: Английский

Процитировано

27

Secure document sharing model based on blockchain technology and attribute-based encryption DOI
Garima Verma, Soumen Kanrar

Multimedia Tools and Applications, Год журнала: 2023, Номер 83(6), С. 16377 - 16394

Опубликована: Июль 15, 2023

Язык: Английский

Процитировано

14

Investigation and analysis of demand response approaches, bottlenecks, and future potential capabilities for IoT‐enabled smart grid DOI Creative Commons
Muhammad Adnan Khan, Tahir Ali Khan, Muhammad Waseem

и другие.

IET Renewable Power Generation, Год журнала: 2024, Номер 18(15), С. 3509 - 3535

Опубликована: Май 26, 2024

Abstract Significant attempts have been made to make the electrical grid more intelligent and responsive better meet customers' requirements while boosting stability efficiency of current power systems. Smart technologies, which just recently emerged, facilitated incorporation demand response (DR) by introducing an information communication backbone system. The Internet Things (IoT) has emerged as a key technology for smart energy grids. Security concerns major obstacle widespread adoption IoT‐enabled devices because inherent connectivity these gadgets. Therefore, security is crucial factor address before implementation IoT‐based in In this study, framework architecture grids that are enabled IoT first examined. Then, role DR different approaches adopted worldwide schemes effective, discussed detail. Finally, authors discuss how can benefit from cutting‐edge solutions technologies them secure resistant cyber physical attacks.

Язык: Английский

Процитировано

5

Investments in Energy Complexes: Evidence from Tajikistan DOI

Kitmo,

Md. Mominur Rahman

Contributions to management science, Год журнала: 2024, Номер unknown, С. 209 - 219

Опубликована: Янв. 1, 2024

Язык: Английский

Процитировано

4

Role of metaheuristic algorithms in healthcare: a comprehensive investigation across clinical diagnosis, medical imaging, operations management, and public health DOI Creative Commons
Aiman Lameesa, Mahfara Hoque, Md. Sakib Bin Alam

и другие.

Journal of Computational Design and Engineering, Год журнала: 2024, Номер 11(3), С. 223 - 247

Опубликована: Май 1, 2024

Abstract Metaheuristic algorithms have emerged in recent years as effective computational tools for addressing complex optimization problems many areas, including healthcare. These can efficiently search through large solution spaces and locate optimal or near-optimal responses to issues. Although metaheuristic are crucial, previous review studies not thoroughly investigated their applications key healthcare areas such clinical diagnosis monitoring, medical imaging processing, operations management, well public health emergency response. Numerous also failed highlight the common challenges faced by metaheuristics these areas. This thus offers a comprehensive understanding of domains, along with future development. It focuses on specific associated data quality quantity, privacy security, complexity high-dimensional spaces, interpretability. We investigate capacity tackle mitigate efficiently. significantly contributed decision-making optimizing treatment plans resource allocation improving patient outcomes, demonstrated literature. Nevertheless, improper utilization may give rise various complications within medicine despite numerous benefits. Primary concerns comprise employed, challenge ethical considerations concerning confidentiality well-being patients. Advanced optimize scheduling maintenance equipment, minimizing operational downtime ensuring continuous access critical resources.

Язык: Английский

Процитировано

4