Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (219)
  • Open Access

    ARTICLE

    Graph-Based Replication and Two Factor Authentication in Cloud Computing

    S. Lavanya1,*, N. M. Saravanakumar2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2869-2883, 2023, DOI:10.32604/csse.2023.029040

    Abstract Many cutting-edge methods are now possible in real-time commercial settings and are growing in popularity on cloud platforms. By incorporating new, cutting-edge technologies to a larger extent without using more infrastructures, the information technology platform is anticipating a completely new level of development. The following concepts are proposed in this research paper: 1) A reliable authentication method Data replication that is optimised; graph-based data encryption and packing colouring in Redundant Array of Independent Disks (RAID) storage. At the data centre, data is encrypted using crypto keys called Key Streams. These keys are produced using the packing colouring method in the… More >

  • Open Access

    ARTICLE

    Secured Health Data Transmission Using Lagrange Interpolation and Artificial Neural Network

    S. Vidhya1,*, V. Kalaivani2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2673-2692, 2023, DOI:10.32604/csse.2023.027724

    Abstract In recent decades, the cloud computing contributes a prominent role in health care sector as the patient health records are transferred and collected using cloud computing services. The doctors have switched to cloud computing as it provides multiple advantageous measures including wide storage space and easy availability without any limitations. This necessitates the medical field to be redesigned by cloud technology to preserve information about patient’s critical diseases, electrocardiogram (ECG) reports, and payment details. The proposed work utilizes a hybrid cloud pattern to share Massachusetts Institute of Technology-Beth Israel Hospital (MIT-BIH) resources over the private and public cloud. The stored… More >

  • Open Access

    ARTICLE

    Remote Sensing Data Processing Process Scheduling Based on Reinforcement Learning in Cloud Environment

    Ying Du1,2, Shuo Zhang1,2, Pu Cheng3,*, Rita Yi Man Li4, Xiao-Guang Yue5,6

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.3, pp. 1965-1979, 2023, DOI:10.32604/cmes.2023.024871

    Abstract Task scheduling plays a crucial role in cloud computing and is a key factor determining cloud computing performance. To solve the task scheduling problem for remote sensing data processing in cloud computing, this paper proposes a workflow task scheduling algorithm---Workflow Task Scheduling Algorithm based on Deep Reinforcement Learning (WDRL). The remote sensing data process modeling is transformed into a directed acyclic graph scheduling problem. Then, the algorithm is designed by establishing a Markov decision model and adopting a fitness calculation method. Finally, combine the advantages of reinforcement learning and deep neural networks to minimize make-time for remote sensing data processes… More >

  • Open Access

    REVIEW

    Survey on Task Scheduling Optimization Strategy under Multi-Cloud Environment

    Qiqi Zhang1, Shaojin Geng2, Xingjuan Cai1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.3, pp. 1863-1900, 2023, DOI:10.32604/cmes.2023.022287

    Abstract Cloud computing technology is favored by users because of its strong computing power and convenient services. At the same time, scheduling performance has an extremely efficient impact on promoting carbon neutrality. Currently, scheduling research in the multi-cloud environment aims to address the challenges brought by business demands to cloud data centers during peak hours. Therefore, the scheduling problem has promising application prospects under the multi-cloud environment. This paper points out that the currently studied scheduling problems in the multi-cloud environment mainly include independent task scheduling and workflow task scheduling based on the dependencies between tasks. This paper reviews the concepts,… More > Graphic Abstract

    Survey on Task Scheduling Optimization Strategy under Multi-Cloud Environment

  • Open Access

    ARTICLE

    Healthcare Monitoring Using Ensemble Classifiers in Fog Computing Framework

    P. M. Arunkumar1, Mehedi Masud2, Sultan Aljahdali2, Mohamed Abouhawwash3,4,*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2265-2280, 2023, DOI:10.32604/csse.2023.032571

    Abstract Nowadays, the cloud environment faces numerous issues like synchronizing information before the switch over the data migration. The requirement for a centralized internet of things (IoT)-based system has been restricted to some extent. Due to low scalability on security considerations, the cloud seems uninteresting. Since healthcare networks demand computer operations on large amounts of data, the sensitivity of device latency evolved among health networks is a challenging issue. In comparison to cloud domains, the new paradigms of fog computing give fresh alternatives by bringing resources closer to users by providing low latency and energy-efficient data processing solutions. Previous fog computing… More >

  • Open Access

    ARTICLE

    Improved Metaheuristic Based Failure Prediction with Migration Optimization in Cloud Environment

    K. Karthikeyan1,*, Liyakathunisa2, Eman Aljohani2, Thavavel Vaiyapuri3

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1641-1654, 2023, DOI:10.32604/csse.2023.031582

    Abstract Cloud data centers consume high volume of energy for processing and switching the servers among different modes. Virtual Machine (VM) migration enhances the performance of cloud servers in terms of energy efficiency, internal failures and availability. On the other end, energy utilization can be minimized by decreasing the number of active, underutilized sources which conversely reduces the dependability of the system. In VM migration process, the VMs are migrated from underutilized physical resources to other resources to minimize energy utilization and optimize the operations. In this view, the current study develops an Improved Metaheuristic Based Failure Prediction with Virtual Machine… More >

  • Open Access

    ARTICLE

    Neighborhood Search Based Improved Bat Algorithm for Web Service Composition

    Fadl Dahan1,2,*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1343-1356, 2023, DOI:10.32604/csse.2023.031142

    Abstract Web services are provided as reusable software components in the services-oriented architecture. More complicated composite services can be combined from these components to satisfy the user requirements represented as a workflow with specified Quality of Service (QoS) limitations. The workflow consists of tasks where many services can be considered for each task. Searching for optimal services combination and optimizing the overall QoS limitations is a Non-deterministic Polynomial (NP)-hard problem. This work focuses on the Web Service Composition (WSC) problem and proposes a new service composition algorithm based on the micro-bats behavior while hunting the prey. The proposed algorithm determines the… More >

  • Open Access

    ARTICLE

    Load Balancing Based on Multi-Agent Framework to Enhance Cloud Environment

    Shrouk H. Hessen1,2,*, Hatem M. Abdul-kader1, Ayman E. Khedr3, Rashed K. Salem1

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3015-3028, 2023, DOI:10.32604/cmc.2023.033212

    Abstract According to the advances in users’ service requirements, physical hardware accessibility, and speed of resource delivery, Cloud Computing (CC) is an essential technology to be used in many fields. Moreover, the Internet of Things (IoT) is employed for more communication flexibility and richness that are required to obtain fruitful services. A multi-agent system might be a proper solution to control the load balancing of interaction and communication among agents. This paper proposes a multi-agent load balancing framework that consists of two phases to optimize the workload among different servers with large-scale CC power with various utilities and a significant number… More >

  • Open Access

    ARTICLE

    IoT-Cloud Assisted Botnet Detection Using Rat Swarm Optimizer with Deep Learning

    Saeed Masoud Alshahrani1, Fatma S. Alrayes2, Hamed Alqahtani3, Jaber S. Alzahrani4, Mohammed Maray5, Sana Alazwari6, Mohamed A. Shamseldin7, Mesfer Al Duhayyim8,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3085-3100, 2023, DOI:10.32604/cmc.2023.032972

    Abstract Nowadays, Internet of Things (IoT) has penetrated all facets of human life while on the other hand, IoT devices are heavily prone to cyberattacks. It has become important to develop an accurate system that can detect malicious attacks on IoT environments in order to mitigate security risks. Botnet is one of the dreadful malicious entities that has affected many users for the past few decades. It is challenging to recognize Botnet since it has excellent carrying and hidden capacities. Various approaches have been employed to identify the source of Botnet at earlier stages. Machine Learning (ML) and Deep Learning (DL)… More >

  • Open Access

    ARTICLE

    Optimal Bottleneck-Driven Deep Belief Network Enabled Malware Classification on IoT-Cloud Environment

    Mohammed Maray1, Hamed Alqahtani2, Saud S. Alotaibi3, Fatma S. Alrayes4, Nuha Alshuqayran5, Mrim M. Alnfiai6, Amal S. Mehanna7, Mesfer Al Duhayyim8,*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3101-3115, 2023, DOI:10.32604/cmc.2023.032969

    Abstract Cloud Computing (CC) is the most promising and advanced technology to store data and offer online services in an effective manner. When such fast evolving technologies are used in the protection of computer-based systems from cyberattacks, it brings several advantages compared to conventional data protection methods. Some of the computer-based systems that effectively protect the data include Cyber-Physical Systems (CPS), Internet of Things (IoT), mobile devices, desktop and laptop computer, and critical systems. Malicious software (malware) is nothing but a type of software that targets the computer-based systems so as to launch cyber-attacks and threaten the integrity, secrecy, and accessibility… More >

Displaying 51-60 on page 6 of 219. Per Page