Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (34)
  • Open Access

    ARTICLE

    Device Discovery in D2D Communication: Scenarios and Challenges

    Adeel Iqbal1, Ali Nauman2, Riaz Hussain1, Irfan Latif Khan1, Ali Khaqan1, Sana Shuja1, Sung Won Kim2,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1735-1750, 2023, DOI:10.32604/cmc.2023.034468 - 06 February 2023

    Abstract Device to Device (D2D) communication is expected to be an essential part of 5G cellular networks. D2D communication enables close-proximity devices to establish a direct communication session. D2D communication offers many advantages, such as reduced latency, high data rates, range extension, and cellular offloading. The first step to establishing a D2D session is device discovery; an efficient device discovery will lead to efficient D2D communication. D2D device further needs to manage its mode of communication, perform resource allocation, manage its interference and most importantly control its power to improve the battery life of the device. More >

  • Open Access

    ARTICLE

    An Optimal Algorithm for Resource Allocation in D2D Communication

    Shahad Alyousif1,2, Mohammed Dauwed3,*, Rafal Nader4, Mohammed Hasan Ali5, Mustafa Musa Jabar6,7, Ahmed Alkhayyat8

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 531-546, 2023, DOI:10.32604/cmc.2023.034329 - 06 February 2023

    Abstract The number of mobile devices accessing wireless networks is skyrocketing due to the rapid advancement of sensors and wireless communication technology. In the upcoming years, it is anticipated that mobile data traffic would rise even more. The development of a new cellular network paradigm is being driven by the Internet of Things, smart homes, and more sophisticated applications with greater data rates and latency requirements. Resources are being used up quickly due to the steady growth of smartphone devices and multimedia apps. Computation offloading to either several distant clouds or close mobile devices has consistently… More >

  • Open Access

    ARTICLE

    Latency Minimization Using an Adaptive Load Balancing Technique in Microservices Applications

    G. Selvakumar1,*, L. S. Jayashree2, S. Arumugam3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1215-1231, 2023, DOI:10.32604/csse.2023.032509 - 20 January 2023

    Abstract Advancements in cloud computing and virtualization technologies have revolutionized Enterprise Application Development with innovative ways to design and develop complex systems. Microservices Architecture is one of the recent techniques in which Enterprise Systems can be developed as fine-grained smaller components and deployed independently. This methodology brings numerous benefits like scalability, resilience, flexibility in development, faster time to market, etc. and the advantages; Microservices bring some challenges too. Multiple microservices need to be invoked one by one as a chain. In most applications, more than one chain of microservices runs in parallel to complete a particular… More >

  • Open Access

    ARTICLE

    Fuzzy Logic Based Handover Authentication in 5g Telecommunication Heterogeneous Networks

    J. Divakaran1,*, Arvind Chakrapani2, K. Srihari3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1141-1152, 2023, DOI:10.32604/csse.2023.028050 - 20 January 2023

    Abstract Under various deployment circumstances, fifth-generation (5G) telecommunications delivers improved network compound management with fast communication channels. Due to the introduction of the Internet of Things (IoT) in data management, the majority of the ultra-dense network models in 5G networks frequently have decreased spectral efficiency, weak handover management, and vulnerabilities. The majority of traditional handover authentication models are seriously threatened, making them vulnerable to a variety of security attacks. The authentication of networked devices is the most important issue. Therefore, a model that incorporates the handover mechanism and authentication model must be created. This article uses More >

  • Open Access

    ARTICLE

    Performance Framework for Virtual Machine Migration in Cloud Computing

    Tahir Alyas1, Taher M. Ghazal2,3, Badria Sulaiman Alfurhood4, Munir Ahmad5, Ossma Ali Thawabeh6, Khalid Alissa7, Qaiser Abbas8,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6289-6305, 2023, DOI:10.32604/cmc.2023.035161 - 28 December 2022

    Abstract In the cloud environment, the transfer of data from one cloud server to another cloud server is called migration. Data can be delivered in various ways, from one data centre to another. This research aims to increase the migration performance of the virtual machine (VM) in the cloud environment. VMs allow cloud customers to store essential data and resources. However, server usage has grown dramatically due to the virtualization of computer systems, resulting in higher data centre power consumption, storage needs, and operating expenses. Multiple VMs on one data centre manage share resources like central… More >

  • Open Access

    ARTICLE

    Towards Fully Secure 5G Ultra-Low Latency Communications: A Cost-Security Functions Analysis

    Borja Bordel1,*, Ramón Alcarria1, Joaquin Chung2, Rajkumar Kettimuthu2, Tomás Robles1, Iván Armuelles3

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 855-880, 2023, DOI:10.32604/cmc.2023.026787 - 22 September 2022

    Abstract Future components to enhance the basic, native security of 5G networks are either complex mechanisms whose impact in the requiring 5G communications are not considered, or lightweight solutions adapted to ultra-reliable low-latency communications (URLLC) but whose security properties remain under discussion. Although different 5G network slices may have different requirements, in general, both visions seem to fall short at provisioning secure URLLC in the future. In this work we address this challenge, by introducing cost-security functions as a method to evaluate the performance and adequacy of most developed and employed non-native enhanced security mechanisms in… More >

  • Open Access

    ARTICLE

    Dynamic Vehicular Clustering Enhancing Video on Demand Services Over Vehicular Ad-hoc Networks

    M. Almutiq1, L. Sellami1,2,*, B. Alaya1,3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3493-3510, 2022, DOI:10.32604/cmc.2022.024571 - 29 March 2022

    Abstract Nowadays, video streaming applications are becoming one of the tendencies driving vehicular network users. In this work, considering the unpredictable vehicle density, the unexpected acceleration or deceleration of the different vehicles included in the vehicular traffic load, and the limited radio range of the employed communication scheme, we introduce the “Dynamic Vehicular Clustering” (DVC) algorithm as a new scheme for video streaming systems over vehicular ad-hoc networks (VANET). The proposed algorithm takes advantage of the small cells concept and the introduction of wireless backhauls, inspired by the different features and the performance of the Long… More >

  • Open Access

    ARTICLE

    Optimal Data Placement and Replication Approach for SIoT with Edge

    B. Prabhu Shankar1,*, S. Chitra2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 661-676, 2022, DOI:10.32604/csse.2022.019507 - 25 October 2021

    Abstract Social networks (SNs) are sources with extreme number of users around the world who are all sharing data like images, audio, and video to their friends using IoT devices. This concept is the so-called Social Internet of Things (SIot). The evolving nature of edge-cloud computing has enabled storage of a large volume of data from various sources, and this task demands an efficient storage procedure. For this kind of large volume of data storage, the usage of data replication using edge with geo-distributed cloud service area is suited to fulfill the user’s expectations with low… More >

  • Open Access

    ARTICLE

    Exploring and Modelling IoT Offloading Policies in Edge Cloud Environments

    Jaber Almutairi1, Mohammad Aldossary2,*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 611-624, 2022, DOI:10.32604/csse.2022.018112 - 25 October 2021

    Abstract The Internet of Things (IoT) has recently become a popular technology that can play increasingly important roles in every aspect of our daily life. For collaboration between IoT devices and edge cloud servers, edge server nodes provide the computation and storage capabilities for IoT devices through the task offloading process for accelerating tasks with large resource requests. However, the quantitative impact of different offloading architectures and policies on IoT applications’ performance remains far from clear, especially with a dynamic and unpredictable range of connected physical and virtual devices. To this end, this work models the More >

  • Open Access

    ARTICLE

    Design of Latency-Aware IoT Modules in Heterogeneous Fog-Cloud Computing Networks

    Syed Rizwan Hassan1, Ishtiaq Ahmad1, Jamel Nebhen2, Ateeq Ur Rehman3, Muhammad Shafiq4, Jin-Ghoo Choi4,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6057-6072, 2022, DOI:10.32604/cmc.2022.020428 - 11 October 2021

    Abstract The modern paradigm of the Internet of Things (IoT) has led to a significant increase in demand for latency-sensitive applications in Fog-based cloud computing. However, such applications cannot meet strict quality of service (QoS) requirements. The large-scale deployment of IoT requires more effective use of network infrastructure to ensure QoS when processing big data. Generally, cloud-centric IoT application deployment involves different modules running on terminal devices and cloud servers. Fog devices with different computing capabilities must process the data generated by the end device, so deploying latency-sensitive applications in a heterogeneous fog computing environment is… More >

Displaying 21-30 on page 3 of 34. Per Page