Green communication in IoT networks using a hybrid optimization algorithm

PKR Maddikunta, TR Gadekallu, R Kaluri… - Computer …, 2020 - Elsevier
There has been a huge surge in the Internet of Things (IoT) applications in recent years. The
sensor nodes in the IoT network generate data continuously that directly affects the longevity …

Energy-efficient and secure mobile fog-based cloud for the Internet of Things

A Razaque, Y Jararweh, B Alotaibi, M Alotaibi… - Future Generation …, 2022 - Elsevier
The mobile fog-based cloud (MFBC) plays a major role for the Internet of Things (IoT) and is
highly suitable for obtaining virtualized data without additional waiting time. However, the …

Energy-efficient service-oriented architecture for mobile cloud handover

Q Bani Hani, JP Dichter - Journal of Cloud Computing, 2017 - Springer
Mobile cloud computing uses features to deliver outsourcing data to remotely available
mobile devices. However, the flexible nature of the mobile device is a critical challenge for …

Technical debt as an external software attribute

L Lavazza, S Morasca, D Tosi - … of the 2018 International Conference on …, 2018 - dl.acm.org
Background: Technical debt is currently receiving increasing attention from practitioners and
researchers. Several metaphors, concepts, and indications concerning technical debt have …

Towards better ocular recognition for secure real-world applications

RM Parizi, A Dehghantanha… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
In the last decade, biometric has become one of the most common uses for verification and
authentication of someone's personal identity. Biometrics are defined as the measurement …

Research on information integration architecture of virtual enterprise oriented to e-commerce platform

F Chen, Y Chen - 2019 12th International Conference on …, 2019 - ieeexplore.ieee.org
This paper explains the main contents of the integration theory of modern e-commerce
enterprises, which covers the architecture, theoretical basis, enabling technology and …

Analytical evaluation of k–anonymity algorithm and epsilon-differential privacy mechanism in cloud computing environment

A Razaque, MBH Frej, H Yiming… - 2019 IEEE Cloud …, 2019 - ieeexplore.ieee.org
Expected and unexpected risks in cloud computing, which included data security, data
segregation, and the lack of control and knowledge, have led to some dilemmas in several …

Construction of Enterprise Operation Simulation System Platform based on Service Oriented Architecture

M Ke - Proceedings of the 3rd Asia-Pacific Conference on …, 2022 - dl.acm.org
With the gradual formation of world economic integration, enterprises as the main body of
the market economy will face more intense domestic and foreign market competition. The …

Enhancing Enterprise Network Performance: The Use of Quality of Service and Traffic Control

H Ali - 2018 - researchoutput.csu.edu.au
Quality of service and inter-domain traffic control are the current important issues in
computer communication and IP telephony in Local Area Networks and Wide Area …

[PDF][PDF] Construction of Urban IOT Infrastructure Platform from the Perspective of Low Carbon Smart City Construction

H Yan - International Journal of Frontiers in Engineering …, 2021 - francis-press.com
Under the promotion of technology and people's requirements, the construction of smart city
in the new era has become a new trend of urban development. Intelligent means are used to …