Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    Latency-Aware Dynamic Second Offloading Service in SDN-Based Fog Architecture

    Samah Ibrahim AlShathri, Dina S. M. Hassan*, Samia Allaoua Chelloug

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1501-1526, 2023, DOI:10.32604/cmc.2023.035602

    Abstract Task offloading is a key strategy in Fog Computing (FC). The definition of resource-constrained devices no longer applies to sensors and Internet of Things (IoT) embedded system devices alone. Smart and mobile units can also be viewed as resource-constrained devices if the power, cloud applications, and data cloud are included in the set of required resources. In a cloud-fog-based architecture, a task instance running on an end device may need to be offloaded to a fog node to complete its execution. However, in a busy network, a second offloading decision is required when the fog node becomes overloaded. The possibility… More >

  • Open Access

    ARTICLE

    Device Discovery in D2D Communication: Scenarios and Challenges

    Adeel Iqbal1, Ali Nauman2, Riaz Hussain1, Irfan Latif Khan1, Ali Khaqan1, Sana Shuja1, Sung Won Kim2,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1735-1750, 2023, DOI:10.32604/cmc.2023.034468

    Abstract Device to Device (D2D) communication is expected to be an essential part of 5G cellular networks. D2D communication enables close-proximity devices to establish a direct communication session. D2D communication offers many advantages, such as reduced latency, high data rates, range extension, and cellular offloading. The first step to establishing a D2D session is device discovery; an efficient device discovery will lead to efficient D2D communication. D2D device further needs to manage its mode of communication, perform resource allocation, manage its interference and most importantly control its power to improve the battery life of the device. This work has developed six… More >

  • Open Access

    ARTICLE

    An Optimal Algorithm for Resource Allocation in D2D Communication

    Shahad Alyousif1,2, Mohammed Dauwed3,*, Rafal Nader4, Mohammed Hasan Ali5, Mustafa Musa Jabar6,7, Ahmed Alkhayyat8

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 531-546, 2023, DOI:10.32604/cmc.2023.034329

    Abstract The number of mobile devices accessing wireless networks is skyrocketing due to the rapid advancement of sensors and wireless communication technology. In the upcoming years, it is anticipated that mobile data traffic would rise even more. The development of a new cellular network paradigm is being driven by the Internet of Things, smart homes, and more sophisticated applications with greater data rates and latency requirements. Resources are being used up quickly due to the steady growth of smartphone devices and multimedia apps. Computation offloading to either several distant clouds or close mobile devices has consistently improved the performance of mobile… More >

  • Open Access

    ARTICLE

    Latency Minimization Using an Adaptive Load Balancing Technique in Microservices Applications

    G. Selvakumar1,*, L. S. Jayashree2, S. Arumugam3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1215-1231, 2023, DOI:10.32604/csse.2023.032509

    Abstract Advancements in cloud computing and virtualization technologies have revolutionized Enterprise Application Development with innovative ways to design and develop complex systems. Microservices Architecture is one of the recent techniques in which Enterprise Systems can be developed as fine-grained smaller components and deployed independently. This methodology brings numerous benefits like scalability, resilience, flexibility in development, faster time to market, etc. and the advantages; Microservices bring some challenges too. Multiple microservices need to be invoked one by one as a chain. In most applications, more than one chain of microservices runs in parallel to complete a particular requirement To complete a user’s… More >

  • Open Access

    ARTICLE

    Fuzzy Logic Based Handover Authentication in 5g Telecommunication Heterogeneous Networks

    J. Divakaran1,*, Arvind Chakrapani2, K. Srihari3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1141-1152, 2023, DOI:10.32604/csse.2023.028050

    Abstract Under various deployment circumstances, fifth-generation (5G) telecommunications delivers improved network compound management with fast communication channels. Due to the introduction of the Internet of Things (IoT) in data management, the majority of the ultra-dense network models in 5G networks frequently have decreased spectral efficiency, weak handover management, and vulnerabilities. The majority of traditional handover authentication models are seriously threatened, making them vulnerable to a variety of security attacks. The authentication of networked devices is the most important issue. Therefore, a model that incorporates the handover mechanism and authentication model must be created. This article uses a fuzzy logic model to… More >

  • Open Access

    ARTICLE

    Performance Framework for Virtual Machine Migration in Cloud Computing

    Tahir Alyas1, Taher M. Ghazal2,3, Badria Sulaiman Alfurhood4, Munir Ahmad5, Ossma Ali Thawabeh6, Khalid Alissa7, Qaiser Abbas8,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6289-6305, 2023, DOI:10.32604/cmc.2023.035161

    Abstract In the cloud environment, the transfer of data from one cloud server to another cloud server is called migration. Data can be delivered in various ways, from one data centre to another. This research aims to increase the migration performance of the virtual machine (VM) in the cloud environment. VMs allow cloud customers to store essential data and resources. However, server usage has grown dramatically due to the virtualization of computer systems, resulting in higher data centre power consumption, storage needs, and operating expenses. Multiple VMs on one data centre manage share resources like central processing unit (CPU) cache, network… More >

  • Open Access

    ARTICLE

    Towards Fully Secure 5G Ultra-Low Latency Communications: A Cost-Security Functions Analysis

    Borja Bordel1,*, Ramón Alcarria1, Joaquin Chung2, Rajkumar Kettimuthu2, Tomás Robles1, Iván Armuelles3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 855-880, 2023, DOI:10.32604/cmc.2023.026787

    Abstract Future components to enhance the basic, native security of 5G networks are either complex mechanisms whose impact in the requiring 5G communications are not considered, or lightweight solutions adapted to ultra-reliable low-latency communications (URLLC) but whose security properties remain under discussion. Although different 5G network slices may have different requirements, in general, both visions seem to fall short at provisioning secure URLLC in the future. In this work we address this challenge, by introducing cost-security functions as a method to evaluate the performance and adequacy of most developed and employed non-native enhanced security mechanisms in 5G networks. We categorize those… More >

  • Open Access

    ARTICLE

    Dynamic Vehicular Clustering Enhancing Video on Demand Services Over Vehicular Ad-hoc Networks

    M. Almutiq1, L. Sellami1,2,*, B. Alaya1,3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3493-3510, 2022, DOI:10.32604/cmc.2022.024571

    Abstract Nowadays, video streaming applications are becoming one of the tendencies driving vehicular network users. In this work, considering the unpredictable vehicle density, the unexpected acceleration or deceleration of the different vehicles included in the vehicular traffic load, and the limited radio range of the employed communication scheme, we introduce the “Dynamic Vehicular Clustering” (DVC) algorithm as a new scheme for video streaming systems over vehicular ad-hoc networks (VANET). The proposed algorithm takes advantage of the small cells concept and the introduction of wireless backhauls, inspired by the different features and the performance of the Long Term Evolution (LTE)-Advanced network. Vehicles… More >

  • Open Access

    ARTICLE

    Optimal Data Placement and Replication Approach for SIoT with Edge

    B. Prabhu Shankar1,*, S. Chitra2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 661-676, 2022, DOI:10.32604/csse.2022.019507

    Abstract Social networks (SNs) are sources with extreme number of users around the world who are all sharing data like images, audio, and video to their friends using IoT devices. This concept is the so-called Social Internet of Things (SIot). The evolving nature of edge-cloud computing has enabled storage of a large volume of data from various sources, and this task demands an efficient storage procedure. For this kind of large volume of data storage, the usage of data replication using edge with geo-distributed cloud service area is suited to fulfill the user’s expectations with low latency. The major issue is… More >

  • Open Access

    ARTICLE

    Exploring and Modelling IoT Offloading Policies in Edge Cloud Environments

    Jaber Almutairi1, Mohammad Aldossary2,*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 611-624, 2022, DOI:10.32604/csse.2022.018112

    Abstract The Internet of Things (IoT) has recently become a popular technology that can play increasingly important roles in every aspect of our daily life. For collaboration between IoT devices and edge cloud servers, edge server nodes provide the computation and storage capabilities for IoT devices through the task offloading process for accelerating tasks with large resource requests. However, the quantitative impact of different offloading architectures and policies on IoT applications’ performance remains far from clear, especially with a dynamic and unpredictable range of connected physical and virtual devices. To this end, this work models the performance impact by exploiting a… More >

Displaying 1-10 on page 1 of 15. Per Page  

Share Link