Cloud Computing and Data Science, Volume 5 Issue 1 (2024) < Previous vol / issue
This issue is in progress but contains articles that are final and fully citable.
Smart Contracts Security Application and Challenges: A Review
by Fadele Ayotunde Alaba, Hakeem Adewale Sulaimon, Madu Ifeyinwa Marisa, Owamoyo Najeem
Abstract: There has been a rise in the demand for blockchain-based smart contract development platforms and language implementations. On the other hand, smart contracts and blockchain applications are generated...
Open Access Research Article PDF
Decision Making: Models, Processes, Techniques
by Taherdoost Hamed , Mitra Madanchian
Abstract: Decision-making is one of the steps in problem-solving that can be applied in manifold areas from personal situations to the management of organizations. There are functions and processes to lead to m...
Open Access Research Article PDF
Geochemical and Geospatial Distribution of Organic Contaminants in the Flood Plain of Ekpetiama, Niger Delta Region of Nigeria
by Davidson E. Egirani, Miebi M. Alaowei
Abstract: This study investigated the geochemical and geospatial distribution of organic contaminants in the floodplain water and sediments of Ekpetiama in the Niger Delta Region of Nigeria. This study is neces...
Open Access Research Article PDF
Exploring the Advancements in High-Performance Computing Paradigm for Remote Sensing Big Data Analytics
by SK Sudha, Aji S
Abstract: The incredible growth in Remote Sensing (RS) data volume, with high spectral-spatial-temporal resolutions, has been utilized in various application domains. With the rapid advancements in modern senso...
Open Access Research Article PDF
Machine Learning for Intrusion Detection in Ad-hoc Networks: Wormhole and Blackhole Attacks Case
by Aurelle Tchagna Kouanou, Theophile Fozin Fonzin, Franck Mani Zanga, Adèle Ngo Mouelas, Gerad Nzebop Ndenoka, Michael Sone Ekonde
Abstract: This paper addresses the security concerns associated with Mobile Ad-hoc Networks (MANET) and proposes a new method for detecting and preventing attacks using machine learning. The study involved the ...
Open Access Research Article PDF