scispace - formally typeset
Search or ask a question

Showing papers in "Future Generation Computer Systems in 2019"


Journal ArticleDOI
TL;DR: The statistical results and comparisons show that the HHO algorithm provides very promising and occasionally competitive results compared to well-established metaheuristic techniques.

2,871 citations


Journal ArticleDOI
TL;DR: In this paper, the authors proposed a new dataset, called Bot-IoT, which incorporates legitimate and simulated IoT network traffic, along with various types of attacks, and evaluated the reliability of the dataset using different statistical and machine learning methods for forensics purposes.

736 citations


Journal ArticleDOI
TL;DR: A novel metaheuristic algorithm named Henry gas solubility optimization (HGSO), which mimics the behavior governed by Henry’s law to solve challenging optimization problems, provides competitive and superior results compared to other algorithms when solving challenging optimize problems.

602 citations


Journal ArticleDOI
TL;DR: This article discusses the importance of Edge computing in real life scenarios where response time constitutes the fundamental requirement for many applications and identifies the requirements and discusses open research challenges in Edge computing.

590 citations


Journal ArticleDOI
TL;DR: A systematic literature review of the technologies for fog computing in the healthcare IoT systems field and analyzing the previous is presented, providing motivation, limitations faced by researchers, and suggestions proposed to analysts for improving this essential research field.

411 citations


Journal ArticleDOI
TL;DR: The privacy issues caused due to integration of blockchain in IoT applications by focusing over the applications of the authors' daily use are discussed, and implementation of five privacy preservation strategies in blockchain-based IoT systems named as anonymization, encryption, private contract, mixing, and differential privacy are discussed.

359 citations


Journal ArticleDOI
TL;DR: A blockchain based searchable encryption scheme for EHRs is proposed that ensures the integrity, anti-tampering, and traceability of EHR’s’ index as only the index is migrated to the blockchain to facilitate propagation.

302 citations


Journal ArticleDOI
TL;DR: An innovative automated diagnosis classification method for Computed Tomography images of lungs with the assistance of Optimal Deep Neural Network (ODNN) and Linear Discriminate Analysis (LDA) is presented.

288 citations


Journal ArticleDOI
TL;DR: It is demonstrated that the novel MCNN and CCNN fusion methods outperforms all the state-of-the-art machine learning and deep learning techniques for EEG classification.

283 citations


Journal ArticleDOI
TL;DR: Understanding the user’s side may be crucial for designing better chatbots in the future and, thus, can contribute to advancing the field of human–computer interaction.

283 citations


Journal ArticleDOI
TL;DR: A comprehensive survey of task scheduling strategies and the associated metrics suitable for cloud computing environments is presented and the various issues related to scheduling methodologies and the limitations to overcome are discussed.

Journal ArticleDOI
TL;DR: A system model and dynamic schedules of data/control-constrained computing tasks are investigated, including the execution time and energy consumption for mobile devices, and NSGA-III (non-dominated sorting genetic algorithm III) is employed to address the multi-objective optimization problem of task offloading in cloud-edge computing.

Journal ArticleDOI
TL;DR: IoT’s novel factors affecting traditional computer forensics are explored, including its strengths and weaknesses, and several indispensable open research challenges are identified as future research directions.

Journal ArticleDOI
TL;DR: This paper presents a patient centric healthcare data management system using blockchain technology as storage which helps to attain privacy and analyzes the data processing procedures and the cost effectiveness of the smart contracts used in the system.

Journal ArticleDOI
TL;DR: This paper proposes a controllable blockchain data management (CBDM) model that can be deployed in a cloud environment and then evaluates its security and performance, in order to demonstrate utility.

Journal ArticleDOI
TL;DR: A new platform that enables innovative analytics on IoT captured data from smart homes and the use of fog nodes and cloud system to allow data-driven services and address the challenges of complexities and resource demands for online and offline data processing, storage, and classification analysis is presented.

Journal ArticleDOI
TL;DR: This study presents a smart agriculture IoT system based on deep reinforcement learning which includes four layers, namely agricultural data collection layer, edge computing layer, agricultural data transmission layer, and cloud computing layer.

Journal ArticleDOI
TL;DR: Based on SecTrust-RPL, a time-based trust-aware RPL routing protocol, the viability of using trust as an effective security system for mitigating attacks in IoT networks is shown.

Journal ArticleDOI
TL;DR: A computer-aided detection system to aid in the detection of F EEG signals has been developed, and the performance of nonlinear features for differentiating F and NF EEG signals is compared.

Journal ArticleDOI
TL;DR: A privacy preservation method, named ECO, with privacy preservation for IoV is proposed in this paper and NSGA-II (non-dominated sorting genetic algorithm II) is adopted to realize multi-objective optimization to reduce the execution time and energy consumption of ECDs and prevent privacy conflicts of the computing tasks.

Journal ArticleDOI
TL;DR: The emergence of smart cities aims at mitigating the challenges raised due to the continuous urbanization development and increasing population density in cities.

Journal ArticleDOI
TL;DR: In this paper, the authors investigated the recent BDA technologies, algorithms and techniques that can lead to the development of intelligent Industrial Internet of Things (IIoT) systems and identified the indispensable challenges that remain to be addressed as future research directions as well.

Journal ArticleDOI
TL;DR: This paper studies the joint optimization of cost and makespan of scheduling workflows in IaaS clouds, and proposes a novel workflow scheduling scheme which closely integrates the fuzzy dominance sort mechanism with the list scheduling heuristic HEFT.

Journal ArticleDOI
TL;DR: This paper proposes an improved Long Short-Term Memory-enhanced forget-gate network model, abbreviated as LSTM-EFG, used to forecasting wind power, which has an higher accuracy with an increase of 18.3% than those of the other forecasting models, and at the same time the convergence process has been sped up.

Journal ArticleDOI
TL;DR: The proposed method can detect and classify ransomware that can fingerprint the environment and it is discovered that different feature dimensions are required for achieving similar classifier performance with feature N-grams of diverse lengths.

Journal ArticleDOI
TL;DR: The proposed autonomic deep Q-learning based method significantly improves the performance of the computation offloading through minimizing the latency of service computing and is shown as energy efficient with respect to the state-of-the-art computation off loading solutions.

Journal ArticleDOI
TL;DR: This work presents ChainSQL, an open-source system developed by integrating the blockchain with the database, i.e. ChainSQL features a tamper-resistant and consistent multi-active database, a reliable and cost effective data-level disaster recovery backup and an auditable transaction log mechanism.

Journal ArticleDOI
TL;DR: This study will help organizations to rethink their strategies according to skills development to respond to the challenges of digital transformation and will help individuals regarding the challenges faced by organizations and opportunities for new disruptive business.

Journal ArticleDOI
TL;DR: A comprehensively review the feasibility of employing SM for power quality and reliability monitoring in IoT-enabled SGs, and provides a detailed overview about the SMs, wireless communication technologies, and routing algorithms as enabling technologies in AMI.

Journal ArticleDOI
TL;DR: Fog computing (fog networking) is known as a decentralized computing infrastructure in which data, applications, compute as well as data storage are scattered in the most logical and efficient manner.