Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (425)
  • Open Access

    ARTICLE

    Using Metaheuristic OFA Algorithm for Service Placement in Fog Computing

    Riza Altunay1,2,*, Omer Faruk Bay3

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2881-2897, 2023, DOI:10.32604/cmc.2023.042340

    Abstract The use of fog computing in the Internet of Things (IoT) has emerged as a crucial solution, bringing cloud services closer to end users to process large amounts of data generated within the system. Despite its advantages, the increasing task demands from IoT objects often overload fog devices with limited resources, resulting in system delays, high network usage, and increased energy consumption. One of the major challenges in fog computing for IoT applications is the efficient deployment of services between fog clouds. To address this challenge, we propose a novel Optimal Foraging Algorithm (OFA) for task placement on appropriate fog… More >

  • Open Access

    ARTICLE

    A Novel Energy and Communication Aware Scheduling on Green Cloud Computing

    Laila Almutairi1, Shabnam Mohamed Aslam2,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2791-2811, 2023, DOI:10.32604/cmc.2023.040268

    Abstract The rapid growth of service-oriented and cloud computing has created large-scale data centres worldwide. Modern data centres’ operating costs mostly come from back-end cloud infrastructure and energy consumption. In cloud computing, extensive communication resources are required. Moreover, cloud applications require more bandwidth to transfer large amounts of data to satisfy end-user requirements. It is also essential that no communication source can cause congestion or bag loss owing to unnecessary switching buffers. This paper proposes a novel Energy and Communication (EC) aware scheduling (EC-scheduler) algorithm for green cloud computing, which optimizes data centre energy consumption and traffic load. The primary goal… More >

  • Open Access

    ARTICLE

    Addressing the Issues and Developments Correlated with Envisaged 5G Mobile Technologies: Comprehensive Solutions

    Idrees Sarhan Kocher*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2205-2223, 2023, DOI:10.32604/cmc.2023.039392

    Abstract Fifth Generation (5G) communications are regarded as the cornerstone to household consumer experience improvements and smart manufacturing revolution from the standpoint of industries' objectives. It is anticipated that Envisaged 5G (E5G) mobile technology would be operational in certain developed countries by 2023. The Internet of Things (IoTs) will transform how humans live when combined with smart and integrated sensing devices, such as in-home sensing devices. Recent research is being carried out all over the world to produce a new technique that can be crucial in the success of the anticipated 5G mobile technology. High output, reduced latency, highly reliable, greater… More >

  • Open Access

    ARTICLE

    Efficient Cloud Resource Scheduling with an Optimized Throttled Load Balancing Approach

    V. Dhilip Kumar1, J. Praveenchandar2, Muhammad Arif3,*, Adrian Brezulianu4, Oana Geman5, Atif Ikram3,6

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2179-2188, 2023, DOI:10.32604/cmc.2023.034764

    Abstract Cloud Technology is a new platform that offers on-demand computing Peripheral such as storage, processing power, and other computer system resources. It is also referred to as a system that will let the consumers utilize computational resources like databases, servers, storage, and intelligence over the Internet. In a cloud network, load balancing is the process of dividing network traffic among a cluster of available servers to increase efficiency. It is also known as a server pool or server farm. When a single node is overwhelmed, balancing the workload is needed to manage unpredictable workflows. The load balancer sends the load… More >

  • Open Access

    ARTICLE

    Towards Cache-Assisted Hierarchical Detection for Real-Time Health Data Monitoring in IoHT

    Muhammad Tahir1,2,*, Mingchu Li1,2, Irfan Khan1,2, Salman A. Al Qahtani3, Rubia Fatima4, Javed Ali Khan5, Muhammad Shahid Anwar6

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2529-2544, 2023, DOI:10.32604/cmc.2023.042403

    Abstract Real-time health data monitoring is pivotal for bolstering road services’ safety, intelligence, and efficiency within the Internet of Health Things (IoHT) framework. Yet, delays in data retrieval can markedly hinder the efficacy of big data awareness detection systems. We advocate for a collaborative caching approach involving edge devices and cloud networks to combat this. This strategy is devised to streamline the data retrieval path, subsequently diminishing network strain. Crafting an adept cache processing scheme poses its own set of challenges, especially given the transient nature of monitoring data and the imperative for swift data transmission, intertwined with resource allocation tactics.… More >

  • Open Access

    ARTICLE

    Enhanced 3D Point Cloud Reconstruction for Light Field Microscopy Using U-Net-Based Convolutional Neural Networks

    Shariar Md Imtiaz1, Ki-Chul Kwon1, F. M. Fahmid Hossain1, Md. Biddut Hossain1, Rupali Kiran Shinde1, Sang-Keun Gil2, Nam Kim1,*

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2921-2937, 2023, DOI:10.32604/csse.2023.040205

    Abstract This article describes a novel approach for enhancing the three-dimensional (3D) point cloud reconstruction for light field microscopy (LFM) using U-net architecture-based fully convolutional neural network (CNN). Since the directional view of the LFM is limited, noise and artifacts make it difficult to reconstruct the exact shape of 3D point clouds. The existing methods suffer from these problems due to the self-occlusion of the model. This manuscript proposes a deep fusion learning (DL) method that combines a 3D CNN with a U-Net-based model as a feature extractor. The sub-aperture images obtained from the light field microscopy are aligned to form… More >

  • Open Access

    ARTICLE

    Efficient Multi-Authority Attribute-Based Searchable Encryption Scheme with Blockchain Assistance for Cloud-Edge Coordination

    Peng Liu1, Qian He1,*, Baokang Zhao2, Biao Guo1, Zhongyi Zhai1

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3325-3343, 2023, DOI:10.32604/cmc.2023.041167

    Abstract Cloud storage and edge computing are utilized to address the storage and computational challenges arising from the exponential data growth in IoT. However, data privacy is potentially risky when data is outsourced to cloud servers or edge services. While data encryption ensures data confidentiality, it can impede data sharing and retrieval. Attribute-based searchable encryption (ABSE) is proposed as an effective technique for enhancing data security and privacy. Nevertheless, ABSE has its limitations, such as single attribute authorization failure, privacy leakage during the search process, and high decryption overhead. This paper presents a novel approach called the blockchain-assisted efficient multi-authority attribute-based… More >

  • Open Access

    ARTICLE

    A Smart Obfuscation Approach to Protect Software in Cloud

    Lei Yu1, Yucong Duan2,*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3949-3965, 2023, DOI:10.32604/cmc.2023.038970

    Abstract Cloud computing and edge computing brought more software, which also brought a new danger of malicious software attacks. Data synchronization mechanisms of software can further help reverse data modifications. Based on the mechanisms, attackers can cover themselves behind the network and modify data undetected. Related knowledge of software reverse engineering can be organized as rules to accelerate the attacks, when attackers intrude cloud server to access the source or binary codes. Therefore, we proposed a novel method to resist this kind of reverse engineering by breaking these rules. Our method is based on software obfuscations and encryptions to enhance the… More >

  • Open Access

    ARTICLE

    Enhancing the Trustworthiness of 6G Based on Trusted Multi-Cloud Infrastructure: A Practice of Cryptography Approach

    Mingxing Zhou1,2, Peng Xiao3, Qixu Wang1,2,*, Shuhua Ruan1,2, Xingshu Chen1,2, Menglong Yang4

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 957-979, 2024, DOI:10.32604/cmes.2023.028612

    Abstract Due to the need for massive device connectivity, low communication latency, and various customizations in 6G architecture, a distributed cloud deployment approach will be more relevant to the space-air-ground-sea integrated network scenario. However, the openness and heterogeneity of the 6G network cause the problems of network security. To improve the trustworthiness of 6G networks, we propose a trusted computing-based approach for establishing trust relationships in multi-cloud scenarios. The proposed method shows the relationship of trust based on dual-level verification. It separates the trustworthy states of multiple complex cloud units in 6G architecture into the state within and between cloud units.… More >

  • Open Access

    ARTICLE

    Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services

    Jinqiu Hou1, Changgen Peng1,*, Weijie Tan1,2, Hongfa Ding3

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 917-938, 2024, DOI:10.32604/cmes.2023.027276

    Abstract Cloud-based services have powerful storage functions and can provide accurate computation. However, the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight. Although the attribute-based proxy re-encryption (ABPRE) schemes based on number theory can solve this problem, it is still difficult to resist quantum attacks and have limited expression capabilities. To address these issues, we present a novel linear secret sharing schemes (LSSS) matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research. Additionally, to detect the activities of illegal proxies, homomorphic signature (HS) technology is… More >

Displaying 21-30 on page 3 of 425. Per Page