AI-Driven Job Scheduling in Cloud Computing: A Comprehensive Review

Academic Background With the rapid development of cloud computing technology, the demand for efficient job scheduling in dynamic and heterogeneous cloud environments has grown significantly. Traditional scheduling algorithms perform well in simple systems but are no longer sufficient for modern, complex cloud infrastructures. Issues such as resourc...

Pythagorean Linguistic Information-Based Green Supplier Selection Using Quantum-Based Group Decision-Making Methodology and the MULTIMOORA Approach

With the increasing severity of global environmental issues, companies are placing greater emphasis on green and sustainable development in supply chain management. Green Supply Chain Management (GSCM) has become a crucial means for enterprises to enhance competitiveness and achieve sustainable development. However, Green Supplier Selection (GSS) i...

A Comprehensive Review of Machine Learning Applications for Internet of Nano Things: Challenges and Future Directions

Academic Background In recent years, the rapid development of nanotechnology and the Internet of Things (IoT) has given rise to a revolutionary field—the Internet of Nano Things (IoNT). The IoNT connects nanoscale devices to the internet, enabling them to play significant roles in areas such as agriculture, military, multimedia, and healthcare. How...

Speech Emotion Recognition in Conversations Using Artificial Intelligence: A Systematic Review and Meta-Analysis

Academic Background Emotion Recognition is an important research direction in the fields of Artificial Intelligence (AI) and Affective Computing, with broad application prospects in areas such as healthcare, education, and Human-Computer Interaction (HCI). Speech, as a significant carrier of emotional expression, can convey rich emotional informati...

Challenges in Detecting Security Threats in WoT: A Systematic Literature Review

With the rapid development of the Internet of Things (IoT) and Web of Things (WoT), security issues have become increasingly prominent. In particular, the frequent occurrence of Denial of Service (DoS) attacks has made the security of WoT systems an urgent problem to be addressed. WoT achieves seamless connectivity between IoT devices and the inter...

Online Signature Watermarking in the Transform Domain

Academic Background With the rapid growth of digital content, the importance of digital signatures in identity verification and content authentication has become increasingly prominent. However, the security and integrity of digital signatures face significant challenges. To protect the authenticity of signatures and prevent tampering, digital wate...