High-Confidence Computing最新文献

筛选
英文 中文
Digital twins in healthcare IoT: A systematic review 医疗物联网中的数字孪生:系统回顾
IF 3.2
High-Confidence Computing Pub Date : 2025-07-03 DOI: 10.1016/j.hcc.2025.100340
Md Rafiul Kabir , Fairuz Shadmani Shishir , Sumaiya Shomaji , Sandip Ray
{"title":"Digital twins in healthcare IoT: A systematic review","authors":"Md Rafiul Kabir ,&nbsp;Fairuz Shadmani Shishir ,&nbsp;Sumaiya Shomaji ,&nbsp;Sandip Ray","doi":"10.1016/j.hcc.2025.100340","DOIUrl":"10.1016/j.hcc.2025.100340","url":null,"abstract":"<div><div>Digital twin technology initially marked its presence in production and engineering, subsequently revolutionizing the healthcare sector with its groundbreaking applications. These include the creation of virtual replicas of patients and medical devices, enabling the formulation of personalized treatment plans. The rise of microcomputing, miniaturized hardware, and advanced machine-to-machine communications has laid the foundation for the Internet-of-Medical Things (IoMT), significantly transforming patient care through remote monitoring and timely diagnostics. Amid these technological strides, this paper offers a systematic review of digital twin technology’s integration within healthcare IoT, underlining its crucial role in promoting personalized medicine and tackling the pressing security challenges inherent in healthcare IoT systems. Focusing solely on the growing field of smart healthcare systems powered by IoT infrastructure, we explore the use of digital twins in digital patient modeling, the lifecycle of smart hospitals, surgical planning, medical devices, the pharmaceutical industry, and the IoMT cyber infrastructure, demonstrating their transformative potential in modern healthcare. Building on these findings, we outline key technical implications and emerging trends, highlight current challenges, and propose future research directions to advance healthcare IoT and its digital twin applications.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 3","pages":"Article 100340"},"PeriodicalIF":3.2,"publicationDate":"2025-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144686786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel approach to privacy and traceability using attribute-based signature in decentralized identifier 在去中心化标识符中使用基于属性的签名实现隐私和可追溯性的新方法
IF 3
High-Confidence Computing Pub Date : 2025-05-27 DOI: 10.1016/j.hcc.2025.100326
Taehoon Kim , Dahee Seo , Im-Yeong Lee , Su-Hyun Kim
{"title":"A novel approach to privacy and traceability using attribute-based signature in decentralized identifier","authors":"Taehoon Kim ,&nbsp;Dahee Seo ,&nbsp;Im-Yeong Lee ,&nbsp;Su-Hyun Kim","doi":"10.1016/j.hcc.2025.100326","DOIUrl":"10.1016/j.hcc.2025.100326","url":null,"abstract":"<div><div>This paper proposes a novel scheme that enhances privacy and ensures accountability by mitigating signature-based correlation risks in decentralized identifiers (DIDs). Existing DIDs often rely on traditional digital signatures, making them vulnerable to attacks that link user identities across transactions. Our proposed scheme leverages attribute-based signatures (ABS) to provide anonymous authentication, preventing such correlation and protecting user privacy. To deter the abuse of anonymity, it incorporates a traceability mechanism, enabling authorized entities to trace a user’s DID when necessary. The scheme’s security, including anonymity and traceability, is formally proven under the random oracle model.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 4","pages":"Article 100326"},"PeriodicalIF":3.0,"publicationDate":"2025-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144908807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based inter-operator settlement system 基于区块链的运营商间结算系统
IF 3.2
High-Confidence Computing Pub Date : 2025-04-30 DOI: 10.1016/j.hcc.2025.100324
Shifu Zhang, Yulin Pan
{"title":"Blockchain-based inter-operator settlement system","authors":"Shifu Zhang,&nbsp;Yulin Pan","doi":"10.1016/j.hcc.2025.100324","DOIUrl":"10.1016/j.hcc.2025.100324","url":null,"abstract":"<div><div>Inter-network settlement is a critical mechanism for ensuring quality service and sustainable growth in the telecommunications industry. However, existing practices among operators suffer from inefficient, including manual workflows, untrustworthy data foundations, insecure dispute resolution, and insufficient accountability oversight. These challenges lead to prolonged settlement cycles, operational redundancies, and heightened risks of errors or leaks. To address these issues, we propose a blockchain-powered settlement chain framework that integrates business and technical systems to enable intelligent, trusted, and automated cross-operator settlement management. By synergizing consortium blockchain, privacy-preserving computation, and decentralized governance protocols, the framework establishes an end-to-end digital workflow covering data exchange, verification, auditing, and reconciliation. Key innovations include: (1) a multi-operator co-built consortium chain with cross-cloud networking and peer-to-peer governance; (2) a “data-available-but-invisible” auditing mechanism combining blockchain and privacy-preserving computation to ensure secure, compliant interactions; and (3) a dynamic chaincode architecture supporting real-time rule synchronization and adaptive cryptographic controls. The framework achieves full-process traceability, automated reconciliation, and enhanced financial governance while reducing reliance on manual intervention. This work provides a transformative paradigm for modernizing telecommunications settlement systems through digital trust infrastructure.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 2","pages":"Article 100324"},"PeriodicalIF":3.2,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144147787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedBS: Solving data heterogeneity issue in federated learning using balanced subtasks FedBS:使用平衡子任务解决联邦学习中的数据异构问题
IF 3
High-Confidence Computing Pub Date : 2025-04-16 DOI: 10.1016/j.hcc.2025.100322
Chuxiao Su , Jing Wu , Rui Zhang , Zi Kang , Hui Xia , Cheng Zhang
{"title":"FedBS: Solving data heterogeneity issue in federated learning using balanced subtasks","authors":"Chuxiao Su ,&nbsp;Jing Wu ,&nbsp;Rui Zhang ,&nbsp;Zi Kang ,&nbsp;Hui Xia ,&nbsp;Cheng Zhang","doi":"10.1016/j.hcc.2025.100322","DOIUrl":"10.1016/j.hcc.2025.100322","url":null,"abstract":"<div><div>Federated learning has emerged as a popular paradigm for distributed machine learning, enabling participants to collaborate on model training while preserving local data privacy. However, a key challenge in deploying federated learning in real-world applications arises from the substantial heterogeneity in local data distributions across participants. These differences can have negative consequences, such as degraded performance of aggregated models. To address this issue, we propose a novel approach that advocates decomposing the skewed original task into a series of relatively balanced subtasks. Decomposing the task allows us to derive unbiased features extractors for the subtasks, which are then utilized to solve the original task. Based on this concept, we have developed the FedBS algorithm. Through comparative experiments on various datasets, we have demonstrated that FedBS outperforms traditional federated learning algorithms such as FedAvg and FedProx in terms of accuracy, convergence speed, and robustness. The main reason behind these improvements is that FedBS addresses the data heterogeneity problem in federated learning by decomposing the original task into smaller, more balanced subtasks, thereby more effectively mitigating imbalances during model training.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 4","pages":"Article 100322"},"PeriodicalIF":3.0,"publicationDate":"2025-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145121274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Text-augmented long-term relation dependency learning for knowledge graph representation 知识图表示的文本增强长期关系依赖学习
IF 3
High-Confidence Computing Pub Date : 2025-04-15 DOI: 10.1016/j.hcc.2025.100315
Quntao Zhu , Mengfan Li , Yuanjun Gao, Yao Wan, Xuanhua Shi, Hai Jin
{"title":"Text-augmented long-term relation dependency learning for knowledge graph representation","authors":"Quntao Zhu ,&nbsp;Mengfan Li ,&nbsp;Yuanjun Gao,&nbsp;Yao Wan,&nbsp;Xuanhua Shi,&nbsp;Hai Jin","doi":"10.1016/j.hcc.2025.100315","DOIUrl":"10.1016/j.hcc.2025.100315","url":null,"abstract":"<div><div>Knowledge graph (KG) representation learning aims to map entities and relations into a low-dimensional representation space, showing significant potential in many tasks. Existing approaches follow two categories: (1) Graph-based approaches encode KG elements into vectors using structural score functions. (2) Text-based approaches embed text descriptions of entities and relations via pre-trained language models (PLMs), further fine-tuned with triples. We argue that graph-based approaches struggle with sparse data, while text-based approaches face challenges with complex relations. To address these limitations, we propose a unified Text-Augmented Attention-based Recurrent Network, bridging the gap between graph and natural language. Specifically, we employ a graph attention network based on local influence weights to model local structural information and utilize a PLM based prompt learning to learn textual information, enhanced by a mask-reconstruction strategy based on global influence weights and textual contrastive learning for improved robustness and generalizability. Besides, to effectively model multi-hop relations, we propose a novel semantic-depth guided path extraction algorithm and integrate cross-attention layers into recurrent neural networks to facilitate learning the long-term relation dependency and offer an adaptive attention mechanism for varied-length information. Extensive experiments demonstrate that our model exhibits superiority over existing models across KG completion and question-answering tasks.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 4","pages":"Article 100315"},"PeriodicalIF":3.0,"publicationDate":"2025-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145105831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of deep learning under adversarial attacks in hierarchical federated learning 层次联邦学习中对抗性攻击下的深度学习分析
IF 3
High-Confidence Computing Pub Date : 2025-04-08 DOI: 10.1016/j.hcc.2025.100321
Duaa S. Alqattan , Vaclav Snasel , Rajiv Ranjan , Varun Ojha
{"title":"Analysis of deep learning under adversarial attacks in hierarchical federated learning","authors":"Duaa S. Alqattan ,&nbsp;Vaclav Snasel ,&nbsp;Rajiv Ranjan ,&nbsp;Varun Ojha","doi":"10.1016/j.hcc.2025.100321","DOIUrl":"10.1016/j.hcc.2025.100321","url":null,"abstract":"<div><div>Hierarchical Federated Learning (HFL) extends traditional Federated Learning (FL) by introducing multi-level aggregation in which model updates pass through clients, edge servers, and a global server. While this hierarchical structure enhances scalability, it also increases vulnerability to adversarial attacks — such as data poisoning and model poisoning — that disrupt learning by introducing discrepancies at the edge server level. These discrepancies propagate through aggregation, affecting model consistency and overall integrity. Existing studies on adversarial behaviour in FL primarily rely on single-metric approaches — such as cosine similarity or Euclidean distance — to assess model discrepancies and filter out anomalous updates. However, these methods fail to capture the diverse ways adversarial attacks influence model updates, particularly in highly heterogeneous data environments and hierarchical structures. Attackers can exploit the limitations of single-metric defences by crafting updates that seem benign under one metric while remaining anomalous under another. Moreover, prior studies have not systematically analysed how model discrepancies evolve over time, vary across regions, or affect clustering structures in HFL architectures. To address these limitations, we propose the Model Discrepancy Score (MDS), a multi-metric framework that integrates Dissimilarity, Distance, Uncorrelation, and Divergence to provide a comprehensive analysis of how adversarial activity affects model discrepancies. Through temporal, spatial, and clustering analyses, we examine how attacks affect model discrepancies at the edge server level in 3LHFL and 4LHFL architectures and evaluate MDS’s ability to distinguish between benign and malicious servers. Our results show that while 4LHFL effectively mitigates discrepancies in regional attack scenarios, it struggles with distributed attacks due to additional aggregation layers that obscure distinguishable discrepancy patterns over time, across regions, and within clustering structures. Factors influencing detection include data heterogeneity, attack sophistication, and hierarchical aggregation depth. These findings highlight the limitations of single-metric approaches and emphasize the need for multi-metric strategies such as MDS to enhance HFL security.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 4","pages":"Article 100321"},"PeriodicalIF":3.0,"publicationDate":"2025-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145158385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-enabled privacy protection scheme for IoT digital identity management 基于区块链的物联网数字身份管理隐私保护方案
IF 3
High-Confidence Computing Pub Date : 2025-03-25 DOI: 10.1016/j.hcc.2025.100320
Hao Yu , Guijuan Wang , Anming Dong , Yubing Han , Yawei Wang , Jiguo Yu
{"title":"Blockchain-enabled privacy protection scheme for IoT digital identity management","authors":"Hao Yu ,&nbsp;Guijuan Wang ,&nbsp;Anming Dong ,&nbsp;Yubing Han ,&nbsp;Yawei Wang ,&nbsp;Jiguo Yu","doi":"10.1016/j.hcc.2025.100320","DOIUrl":"10.1016/j.hcc.2025.100320","url":null,"abstract":"<div><div>With the growth of the Internet of Things (IoT), millions of users, devices, and applications compose a complex and heterogeneous network, which increases the complexity of digital identity management. Traditional centralized digital identity management systems (DIMS) confront single points of failure and privacy leakages. The emergence of blockchain technology presents an opportunity for DIMS to handle the single point of failure problem associated with centralized architectures. However, the transparency inherent in blockchain technology still exposes DIMS to privacy leakages. In this paper, we propose the privacy-protected IoT DIMS (PPID), a novel blockchain-based distributed identity system to protect the privacy of on-chain identity data. The PPID achieves the unlinkability of identity-credential-verification. Specifically, the PPID adopts the Zero Knowledge Proof (ZKP) algorithm and Shamir secret sharing (SSS) to safeguard privacy security, resist replay attacks, and ensure data integrity. Finally, we evaluate the performance of ZKP computation in PPID, as well as the transaction fees of smart contract on the Ethereum blockchain.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 4","pages":"Article 100320"},"PeriodicalIF":3.0,"publicationDate":"2025-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145105833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linkable group signatures against malicious regulators for regulated privacy-preserving cryptocurrencies 针对受监管的保护隐私的加密货币的恶意监管机构的可链接组签名
IF 3
High-Confidence Computing Pub Date : 2025-03-24 DOI: 10.1016/j.hcc.2025.100318
Xiao Wang , Yanqi Zhao , Lingyue Zhang , Min Xie , Yong Yu , Huilin Li
{"title":"Linkable group signatures against malicious regulators for regulated privacy-preserving cryptocurrencies","authors":"Xiao Wang ,&nbsp;Yanqi Zhao ,&nbsp;Lingyue Zhang ,&nbsp;Min Xie ,&nbsp;Yong Yu ,&nbsp;Huilin Li","doi":"10.1016/j.hcc.2025.100318","DOIUrl":"10.1016/j.hcc.2025.100318","url":null,"abstract":"<div><div>With the emergence of illegal behaviors such as money laundering and extortion, the regulation of privacy-preserving cryptocurrency has become increasingly important. However, existing regulated privacy-preserving cryptocurrencies usually rely on a single regulator, which seriously threatens users’ privacy once the regulator is corrupt. To address this issue, we propose a linkable group signature against malicious regulators (ALGS) for regulated privacy-preserving cryptocurrencies. Specifically, a set of regulators work together to regulate users’ behavior during cryptocurrencies transactions. Even if a certain number of regulators are corrupted, our scheme still ensures the identity security of a legal user. Meanwhile, our scheme can prevent double-spending during cryptocurrency transactions. We first propose the model of ALGS and define its security properties. Then, we present a concrete construction of ALGS, which provides CCA-2 anonymity, traceability, non-frameability, and linkability. We finally evaluate our ALGS scheme and report its advantages by comparing other schemes. The implementation result shows that the runtime of our signature algorithm is reduced by 17% compared to Emura et al. (2017) and 49% compared to KSS19 (Krenn et al. 2019), while the verification time is reduced by 31% compared to Emura et al. and 47% compared to KSS19.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 4","pages":"Article 100318"},"PeriodicalIF":3.0,"publicationDate":"2025-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145105827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DC-LoRA: Domain correlation low-rank adaptation for domain incremental learning 面向领域增量学习的领域相关低秩自适应
IF 3
High-Confidence Computing Pub Date : 2025-03-18 DOI: 10.1016/j.hcc.2024.100270
Lin Li, Shiye Wang, Changsheng Li, Ye Yuan, Guoren Wang
{"title":"DC-LoRA: Domain correlation low-rank adaptation for domain incremental learning","authors":"Lin Li,&nbsp;Shiye Wang,&nbsp;Changsheng Li,&nbsp;Ye Yuan,&nbsp;Guoren Wang","doi":"10.1016/j.hcc.2024.100270","DOIUrl":"10.1016/j.hcc.2024.100270","url":null,"abstract":"<div><div>Continual learning, characterized by the sequential acquisition of multiple tasks, has emerged as a prominent challenge in deep learning. During the process of continual learning, deep neural networks experience a phenomenon known as catastrophic forgetting, wherein networks lose the acquired knowledge related to previous tasks when training on new tasks. Recently, parameter-efficient fine-tuning (PEFT) methods have gained prominence in tackling the challenge of catastrophic forgetting. However, within the realm of domain incremental learning, a type characteristic of continual learning, there exists an additional overlooked inductive bias, which warrants attention beyond existing approaches. In this paper, we propose a novel PEFT method called Domain Correlation Low-Rank Adaptation for domain incremental learning. Our approach put forward a domain correlated loss, which encourages the weights of the LoRA module for adjacent tasks to become more similar, thereby leveraging the correlation between different task domains. Furthermore, we consolidate the classifiers of different task domains to improve prediction performance by capitalizing on the knowledge acquired from diverse tasks. To validate the effectiveness of our method, we conduct comparative experiments and ablation studies on publicly available domain incremental learning benchmark dataset. The experimental results demonstrate that our method outperforms state-of-the-art approaches.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 4","pages":"Article 100270"},"PeriodicalIF":3.0,"publicationDate":"2025-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145049160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic OBL-driven whale optimization algorithm for independent tasks offloading in fog computing 雾计算中独立任务卸载的动态obl驱动鲸鱼优化算法
IF 3
High-Confidence Computing Pub Date : 2025-03-18 DOI: 10.1016/j.hcc.2025.100317
Zulfiqar Ali Khan, Izzatdin Abdul Aziz
{"title":"Dynamic OBL-driven whale optimization algorithm for independent tasks offloading in fog computing","authors":"Zulfiqar Ali Khan,&nbsp;Izzatdin Abdul Aziz","doi":"10.1016/j.hcc.2025.100317","DOIUrl":"10.1016/j.hcc.2025.100317","url":null,"abstract":"<div><div>Cloud computing has been the core infrastructure for providing services to the offloaded workloads from IoT devices. However, for time-sensitive tasks, reducing end-to-end delay is a major concern. With advancements in the IoT industry, the computation requirements of incoming tasks at the cloud are escalating, resulting in compromised quality of service. Fog computing emerged to alleviate such issues. However, the resources at the fog layer are limited and require efficient usage. The Whale Optimization Algorithm is a promising meta-heuristic algorithm extensively used to solve various optimization problems. However, being an exploitation-driven technique, its exploration potential is limited, resulting in reduced solution diversity, local optima, and poor convergence. To address these issues, this study proposes a dynamic opposition learning approach to enhance the Whale Optimization Algorithm to offload independent tasks. Opposition-Based Learning (OBL) has been extensively used to improve the exploration capability of the Whale Optimization Algorithm. However, it is computationally expensive and requires efficient utilization of appropriate OBL strategies to fully realize its advantages. Therefore, our proposed algorithm employs three OBL strategies at different stages to minimize end-to-end delay and improve load balancing during task offloading. First, basic OBL and quasi-OBL are employed during population initialization. Then, the proposed dynamic partial-opposition method enhances search space exploration using an information-based triggering mechanism that tracks the status of each agent. The results illustrate significant performance improvements by the proposed algorithm compared to SACO, PSOGA, IPSO, and oppoCWOA using the NASA Ames iPSC and HPC2N workload datasets.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 4","pages":"Article 100317"},"PeriodicalIF":3.0,"publicationDate":"2025-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145105832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信