[1]
S.P. Simar, K. Rajesh, S. Anju, R.S. Raji, and V. Priyanka, “Simulation and emulation tools for fog computing”, Rec. Advan. Comput. Sci. Communicat., vol. 15. 2022no. 3, .
[http://dx.doi.org/10.2174/2666255813999201002152003]
[http://dx.doi.org/10.2174/2666255813999201002152003]
[2]
S. Isha, K. Vijay, and S. Sanjeewani, “A comprehensive survey on grey wolf optimization”, Rec. Advan. Comput. Sci. Communicat., vol. 15. 2022no. 3, .
[http://dx.doi.org/10.2174/2666255813999201007165454]
[http://dx.doi.org/10.2174/2666255813999201007165454]
[3]
S.K. Arun, P.K. Tapas, N.K. Gopal, and B. Aurobinda, “Hybrid dragonfly and pattern search algorithm applied to dynamic economic dispatch problem”, Rec. Advan. Comput. Sci. Communicat., vol. 15. 2022no. 3, .
[http://dx.doi.org/10.2174/2666255813999200826161924]
[http://dx.doi.org/10.2174/2666255813999200826161924]
[4]
N. Yuvaraj, K. Srihari, and D. Gaurav, “Task scheduling in cloud using ACO”, Rec. Advan. Comput. Sci. Communicat., vol. 15. 2022no. 3, .
[http://dx.doi.org/10.2174/2666255813999200831112705]
[http://dx.doi.org/10.2174/2666255813999200831112705]