Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (113)
  • Open Access

    ARTICLE

    Game-Oriented Security Strategy Against Hotspot Attacks for Internet of Vehicles

    Juan Guo1, Yanzhu Liu2,*, Shan Li3, Zhi Li4, Sonia Kherbachi5

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2145-2157, 2021, DOI:10.32604/cmc.2021.016411 - 13 April 2021

    Abstract With the rapid development of mobile communication technology, the application of internet of vehicles (IoV) services, such as for information services, driving safety, and traffic efficiency, is growing constantly. For businesses with low transmission delay, high data processing capacity and large storage capacity, by deploying edge computing in the IoV, data processing, encryption and decision-making can be completed at the local end, thus providing real-time and highly reliable communication capability. The roadside unit (RSU), as an important part of edge computing in the IoV, fulfils an important data forwarding function and provides an interactive communication… More >

  • Open Access

    ARTICLE

    Intelligent Real-Time IoT Traffic Steering in 5G Edge Networks

    Sa Math1, Prohim Tam1, Seokhoon Kim2,*

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3433-3450, 2021, DOI:10.32604/cmc.2021.015490 - 01 March 2021

    Abstract In the Next Generation Radio Networks (NGRN), there will be extreme massive connectivity with the Heterogeneous Internet of Things (HetIoT) devices. The millimeter-Wave (mmWave) communications will become a potential core technology to increase the capacity of Radio Networks (RN) and enable Multiple-Input and Multiple-Output (MIMO) of Radio Remote Head (RRH) technology. However, the challenging key issues in unfair radio resource handling remain unsolved when massive requests are occurring concurrently. The imbalance of resource utilization is one of the main issues occurs when there is overloaded connectivity to the closest RRH receiving exceeding requests. To handle… More >

  • Open Access

    ARTICLE

    A Novel Anonymous Authentication Scheme Based on Edge Computing in Internet of Vehicles

    Xiaoliang Wang1, Xinhui She1, Liang Bai2,*, Yang Qing1, Frank Jiang3

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3349-3361, 2021, DOI:10.32604/cmc.2021.012454 - 01 March 2021

    Abstract The vehicular cloud computing is an emerging technology that changes vehicle communication and underlying traffic management applications. However, cloud computing has disadvantages such as high delay, low privacy and high communication cost, which can not meet the needs of real-time interactive information of Internet of vehicles. Ensuring security and privacy in Internet of Vehicles is also regarded as one of its most important challenges. Therefore, in order to ensure the user information security and improve the real-time of vehicle information interaction, this paper proposes an anonymous authentication scheme based on edge computing. In this scheme,… More >

  • Open Access

    ARTICLE

    A Phase Estimation Algorithm for Quantum Speed-Up Multi-Party Computing

    Wenbin Yu1, Hao Feng1, Yinsong Xu1, Na Yin1, Yadang Chen2,3, Zhi-Xin Yang3,*

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 241-252, 2021, DOI:10.32604/cmc.2021.012649 - 12 January 2021

    Abstract Security and privacy issues have attracted the attention of researchers in the field of IoT as the information processing scale grows in sensor networks. Quantum computing, theoretically known as an absolutely secure way to store and transmit information as well as a speed-up way to accelerate local or distributed classical algorithms that are hard to solve with polynomial complexity in computation or communication. In this paper, we focus on the phase estimation method that is crucial to the realization of a general multi-party computing model, which is able to be accelerated by quantum algorithms. A More >

  • Open Access

    ARTICLE

    A Model Transformation Approach for Detecting Distancing Violations in Weighted Graphs

    Ahmad F. Subahi*

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 13-39, 2021, DOI:10.32604/csse.2021.014376 - 23 December 2020

    Abstract This work presents the design of an Internet of Things (IoT) edge-based system based on model transformation and complete weighted graph to detect violations of social distancing measures in indoor public places. A wireless sensor network based on Bluetooth Low Energy is introduced as the infrastructure of the proposed design. A hybrid model transformation strategy for generating a graph database to represent groups of people is presented as a core middleware layer of the detecting system’s proposed architectural design. A Neo4j graph database is used as a target implementation generated from the proposed transformational system… More >

  • Open Access

    ARTICLE

    A Comprehensive Utility Function for Resource Allocation in Mobile Edge Computing

    Zaiwar Ali1, Sadia Khaf2, Ziaul Haq Abbas2, Ghulam Abbas3, Lei Jiao4, Amna Irshad2, Kyung Sup Kwak5, Muhammad Bilal6,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1461-1477, 2021, DOI:10.32604/cmc.2020.013743 - 26 November 2020

    Abstract In mobile edge computing (MEC), one of the important challenges is how much resources of which mobile edge server (MES) should be allocated to which user equipment (UE). The existing resource allocation schemes only consider CPU as the requested resource and assume utility for MESs as either a random variable or dependent on the requested CPU only. This paper presents a novel comprehensive utility function for resource allocation in MEC. The utility function considers the heterogeneous nature of applications that a UE offloads to MES. The proposed utility function considers all important parameters, including CPU,… More >

  • Open Access

    ARTICLE

    Workload Allocation Based on User Mobility in Mobile Edge Computing

    Tengfei Yang1,2, Xiaojun Shi3, Yangyang Li1,*, Binbin Huang4, Haiyong Xie1,5, Yanting Shen4

    Journal on Big Data, Vol.2, No.3, pp. 105-115, 2020, DOI:10.32604/jbd.2020.010958 - 13 October 2020

    Abstract Mobile Edge Computing (MEC) has become the most possible network architecture to realize the vision of interconnection of all things. By offloading compute-intensive or latency-sensitive applications to nearby small cell base stations (sBSs), the execution latency and device power consumption can be reduced on resource-constrained mobile devices. However, computation delay of Mobile Edge Network (MEN) tasks are neglected while the unloading decision-making is studied in depth. In this paper, we propose a workload allocation scheme which combines the task allocation optimization of mobile edge network with the actual user behavior activities to predict the task More >

  • Open Access

    ARTICLE

    A Novel Edge Computing Based Area Navigation Scheme

    Jianzhong Qi1, 2, *, Qingping Song3, Jim Feng4

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2385-2396, 2020, DOI:10.32604/cmc.2020.011651 - 16 September 2020

    Abstract The area navigation system, discussed in this paper, is composed of ground responders and a navigation terminal and can position a high-velocity aircraft and measure its velocity. This navigation system is silent at ordinary times. It sends out a request signal when positioning is required for an aircraft, and then the ground responders send a signal for resolving the aircraft. Combining the direct sequence spread spectrum and frequency hopping, the concealed communication mode is used in the whole communication process, with short communication pulses as much as possible, so the system has strong concealment and More >

  • Open Access

    ARTICLE

    MoTransFrame: Model Transfer Framework for CNNs on Low-Resource Edge Computing Node

    Panyu Liu1, Huilin Ren2, Xiaojun Shi3, Yangyang Li4, *, Zhiping Cai1, Fang Liu5, Huacheng Zeng6

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 2321-2334, 2020, DOI:10.32604/cmc.2020.010522 - 16 September 2020

    Abstract Deep learning technology has been widely used in computer vision, speech recognition, natural language processing, and other related fields. The deep learning algorithm has high precision and high reliability. However, the lack of resources in the edge terminal equipment makes it difficult to run deep learning algorithms that require more memory and computing power. In this paper, we propose MoTransFrame, a general model processing framework for deep learning models. Instead of designing a model compression algorithm with a high compression ratio, MoTransFrame can transplant popular convolutional neural networks models to resources-starved edge devices promptly and More >

  • Open Access

    ARTICLE

    Edge-Computing with Graph Computation: A Novel Mechanism to Handle Network Intrusion and Address Spoofing in SDN

    Rashid Amin1, *, Mudassar Hussain2, Mohammed Alhameed3, Syed Mohsan Raza4, Fathe Jeribi3, Ali Tahir3

    CMC-Computers, Materials & Continua, Vol.65, No.3, pp. 1869-1890, 2020, DOI:10.32604/cmc.2020.011758 - 16 September 2020

    Abstract Software Defined Networking (SDN) being an emerging network control model is widely recognized as a control and management platform. This model provides efficient techniques to control and manage the enterprise network. Another emerging paradigm is edge computing in which data processing is performed at the edges of the network instead of a central controller. This data processing at the edge nodes reduces the latency and bandwidth requirements. In SDN, the controller is a single point of failure. Several security issues related to the traditional network can be solved by using SDN central management and control.… More >

Displaying 91-100 on page 10 of 113. Per Page