[HTML][HTML] Modern computing: Vision and challenges

SS Gill, H Wu, P Patros, C Ottaviani, P Arora… - … and Informatics Reports, 2024 - Elsevier
Over the past six decades, the computing systems field has experienced significant
transformations, profoundly impacting society with transformational developments, such as …

Blockchain-based solutions supporting reliable healthcare for fog computing and Internet of medical things (IoMT) integration

S Alam, M Shuaib, S Ahmad, DNK Jayakody… - Sustainability, 2022 - mdpi.com
The Internet of Things (IoT) has radically transformed how patient information and
healthcare monitoring are monitored and recorded and has revolutionized the area by …

Energy-efficient clustering protocol for underwater wireless sensor networks using optimized glowworm swarm optimization

S Bharany, S Sharma, N Alsharabi… - Frontiers in Marine …, 2023 - frontiersin.org
In the past few decades, cutting-edge information and communication technology has been
used in several ways to keep an eye on the marine environment. Underwater wireless …

[HTML][HTML] A comprehensive survey of energy-efficient computing to enable sustainable massive IoT networks

MH Alsharif, AH Kelechi, A Jahid… - Alexandria Engineering …, 2024 - Elsevier
Energy efficiency is a key area of research aimed at achieving sustainable and
environmentally friendly networks. With the rise in data traffic and network congestion, IoT …

Optimization of load balancing and task scheduling in cloud computing environments using artificial neural networks-based binary particle swarm optimization (BPSO)

MI Alghamdi - Sustainability, 2022 - mdpi.com
As more people utilize the cloud, more employment opportunities become available. With
constraints such as a limited make-span, a high utilization rate of available resources …

Secure sensitive data sharing using RSA and ElGamal cryptographic algorithms with hash functions

EA Adeniyi, PB Falola, MS Maashi, M Aljebreen… - Information, 2022 - mdpi.com
With the explosion of connected devices linked to one another, the amount of transmitted
data grows day by day, posing new problems in terms of information security, such as …

A security policy protocol for detection and prevention of internet control message protocol attacks in software defined networks

EM Onyema, MA Kumar, S Balasubaramanian… - Sustainability, 2022 - mdpi.com
Owing to the latest advancements in networking devices and functionalities, there is a need
to build future intelligent networks that provide intellectualization, activation, and …

Task scheduling in fog environment—Challenges, tools & methodologies: A review

ZJK Abadi, N Mansouri, M Khalouie - Computer Science Review, 2023 - Elsevier
Even though cloud computing offers many advantages, it can be a poor choice sometimes
because of its slow response to existing requests, leading to the need for fog computing …

A machine learning-based framework for the prediction of cervical cancer risk in women

K Kaushik, A Bhardwaj, S Bharany, N Alsharabi… - Sustainability, 2022 - mdpi.com
One of the most common types of cancer in women is cervical cancer, a disease which is the
most prevalent in poor nations, with one woman dying from it every two minutes. It has a …

Enhanced security using multiple paths routine scheme in cloud-MANETs

T Hai, J Zhou, Y Lu, D Jawawi, D Wang… - Journal of Cloud …, 2023 - Springer
Abstract Cloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access
and deliver cloud services to MANET users through their smart devices. MANETs is a pool of …