Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (149)
  • Open Access

    ARTICLE

    A Fault-Tolerant Mobility-Aware Caching Method in Edge Computing

    Yong Ma1, Han Zhao2, Kunyin Guo3,*, Yunni Xia3,*, Xu Wang4, Xianhua Niu5, Dongge Zhu6, Yumin Dong7

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 907-927, 2024, DOI:10.32604/cmes.2024.048759 - 16 April 2024

    Abstract Mobile Edge Computing (MEC) is a technology designed for the on-demand provisioning of computing and storage services, strategically positioned close to users. In the MEC environment, frequently accessed content can be deployed and cached on edge servers to optimize the efficiency of content delivery, ultimately enhancing the quality of the user experience. However, due to the typical placement of edge devices and nodes at the network’s periphery, these components may face various potential fault tolerance challenges, including network instability, device failures, and resource constraints. Considering the dynamic nature of MEC, making high-quality content caching decisions… More >

  • Open Access

    ARTICLE

    Computing Resource Allocation for Blockchain-Based Mobile Edge Computing

    Wanbo Zhang1, Yuqi Fan1, Jun Zhang1, Xu Ding2,*, Jung Yoon Kim3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 863-885, 2024, DOI:10.32604/cmes.2024.047295 - 16 April 2024

    Abstract Users and edge servers are not fully mutually trusted in mobile edge computing (MEC), and hence blockchain can be introduced to provide trustable MEC. In blockchain-based MEC, each edge server functions as a node in both MEC and blockchain, processing users’ tasks and then uploading the task related information to the blockchain. That is, each edge server runs both users’ offloaded tasks and blockchain tasks simultaneously. Note that there is a trade-off between the resource allocation for MEC and blockchain tasks. Therefore, the allocation of the resources of edge servers to the blockchain and the… More >

  • Open Access

    ARTICLE

    Task Offloading in Edge Computing Using GNNs and DQN

    Asier Garmendia-Orbegozo1, Jose David Nunez-Gonzalez1,*, Miguel Angel Anton2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2649-2671, 2024, DOI:10.32604/cmes.2024.045912 - 11 March 2024

    Abstract In a network environment composed of different types of computing centers that can be divided into different layers (clod, edge layer, and others), the interconnection between them offers the possibility of peer-to-peer task offloading. For many resource-constrained devices, the computation of many types of tasks is not feasible because they cannot support such computations as they do not have enough available memory and processing capacity. In this scenario, it is worth considering transferring these tasks to resource-rich platforms, such as Edge Data Centers or remote cloud servers. For different reasons, it is more exciting and… More > Graphic Abstract

    Task Offloading in Edge Computing Using GNNs and DQN

  • Open Access

    ARTICLE

    Traffic-Aware Fuzzy Classification Model to Perform IoT Data Traffic Sourcing with the Edge Computing

    Huixiang Xu*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2309-2335, 2024, DOI:10.32604/cmc.2024.046253 - 27 February 2024

    Abstract The Internet of Things (IoT) has revolutionized how we interact with and gather data from our surrounding environment. IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to derive valuable insights. The rapid proliferation of Internet of Things (IoT) devices has ushered in an era of unprecedented data generation and connectivity. These IoT devices, equipped with many sensors and actuators, continuously produce vast volumes of data. However, the conventional approach of transmitting all this data to centralized cloud infrastructures for processing and analysis poses significant challenges. However, transmitting… More >

  • Open Access

    ARTICLE

    IoT Task Offloading in Edge Computing Using Non-Cooperative Game Theory for Healthcare Systems

    Dinesh Mavaluru1,*, Chettupally Anil Carie2, Ahmed I. Alutaibi3, Satish Anamalamudi2, Bayapa Reddy Narapureddy4, Murali Krishna Enduri2, Md Ezaz Ahmed1

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1487-1503, 2024, DOI:10.32604/cmes.2023.045277 - 29 January 2024

    Abstract In this paper, we present a comprehensive system model for Industrial Internet of Things (IIoT) networks empowered by Non-Orthogonal Multiple Access (NOMA) and Mobile Edge Computing (MEC) technologies. The network comprises essential components such as base stations, edge servers, and numerous IIoT devices characterized by limited energy and computing capacities. The central challenge addressed is the optimization of resource allocation and task distribution while adhering to stringent queueing delay constraints and minimizing overall energy consumption. The system operates in discrete time slots and employs a quasi-static approach, with a specific focus on the complexities of… More >

  • Open Access

    ARTICLE

    A Deep Learning Approach for Landmines Detection Based on Airborne Magnetometry Imaging and Edge Computing

    Ahmed Barnawi1,*, Krishan Kumar2, Neeraj Kumar1, Bander Alzahrani1, Amal Almansour1

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 2117-2137, 2024, DOI:10.32604/cmes.2023.044184 - 29 January 2024

    Abstract Landmines continue to pose an ongoing threat in various regions around the world, with countless buried landmines affecting numerous human lives. The detonation of these landmines results in thousands of casualties reported worldwide annually. Therefore, there is a pressing need to employ diverse landmine detection techniques for their removal. One effective approach for landmine detection is UAV (Unmanned Aerial Vehicle) based Airborne Magnetometry, which identifies magnetic anomalies in the local terrestrial magnetic field. It can generate a contour plot or heat map that visually represents the magnetic field strength. Despite the effectiveness of this approach,… More >

  • Open Access

    ARTICLE

    A Novel Predictive Model for Edge Computing Resource Scheduling Based on Deep Neural Network

    Ming Gao1,#, Weiwei Cai1,#, Yizhang Jiang1, Wenjun Hu3, Jian Yao2, Pengjiang Qian1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 259-277, 2024, DOI:10.32604/cmes.2023.029015 - 30 December 2023

    Abstract Currently, applications accessing remote computing resources through cloud data centers is the main mode of operation, but this mode of operation greatly increases communication latency and reduces overall quality of service (QoS) and quality of experience (QoE). Edge computing technology extends cloud service functionality to the edge of the mobile network, closer to the task execution end, and can effectively mitigate the communication latency problem. However, the massive and heterogeneous nature of servers in edge computing systems brings new challenges to task scheduling and resource management, and the booming development of artificial neural networks provides More >

  • Open Access

    ARTICLE

    Energy Efficiency Maximization in Mobile Edge Computing Networks via IRS assisted UAV Communications

    Ying Zhang1, Weiming Niu2, Supu Xiu1,3, Guangchen Mu3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1865-1884, 2024, DOI:10.32604/cmes.2023.030114 - 17 November 2023

    Abstract In this paper, we investigate the energy efficiency maximization for mobile edge computing (MEC) in intelligent reflecting surface (IRS) assisted unmanned aerial vehicle (UAV) communications. In particular, UAV can collect the computing tasks of the terrestrial users and transmit the results back to them after computing. We jointly optimize the users’ transmitted beamforming and uploading ratios, the phase shift matrix of IRS, and the UAV trajectory to improve the energy efficiency. The formulated optimization problem is highly non-convex and difficult to be solved directly. Therefore, we decompose the original problem into three sub-problems. We first More >

  • Open Access

    ARTICLE

    IRS Assisted UAV Communications against Proactive Eavesdropping in Mobile Edge Computing Networks

    Ying Zhang1,*, Weiming Niu2, Leibing Yan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.1, pp. 885-902, 2024, DOI:10.32604/cmes.2023.029234 - 22 September 2023

    Abstract In this paper, we consider mobile edge computing (MEC) networks against proactive eavesdropping. To maximize the transmission rate, IRS assisted UAV communications are applied. We take the joint design of the trajectory of UAV, the transmitting beamforming of users, and the phase shift matrix of IRS. The original problem is strong non-convex and difficult to solve. We first propose two basic modes of the proactive eavesdropper, and obtain the closed-form solution for the boundary conditions of the two modes. Then we transform the original problem into an equivalent one and propose an alternating optimization (AO) More >

  • Open Access

    ARTICLE

    Real-Time Prediction Algorithm for Intelligent Edge Networks with Federated Learning-Based Modeling

    Seungwoo Kang1, Seyha Ros1, Inseok Song1, Prohim Tam1, Sa Math2, Seokhoon Kim1,3,*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1967-1983, 2023, DOI:10.32604/cmc.2023.045020 - 29 November 2023

    Abstract Intelligent healthcare networks represent a significant component in digital applications, where the requirements hold within quality-of-service (QoS) reliability and safeguarding privacy. This paper addresses these requirements through the integration of enabler paradigms, including federated learning (FL), cloud/edge computing, software-defined/virtualized networking infrastructure, and converged prediction algorithms. The study focuses on achieving reliability and efficiency in real-time prediction models, which depend on the interaction flows and network topology. In response to these challenges, we introduce a modified version of federated logistic regression (FLR) that takes into account convergence latencies and the accuracy of the final FL model… More >

Displaying 51-60 on page 6 of 149. Per Page