Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (67)
  • Open Access

    ARTICLE

    Sea Turtle Foraging Optimization-Based Controller Placement with Blockchain-Assisted Intrusion Detection in Software-Defined Networks

    Sultan Alkhliwi*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4735-4752, 2023, DOI:10.32604/cmc.2023.037141

    Abstract Software-defined networking (SDN) algorithms are gaining increasing interest and are making networks flexible and agile. The basic idea of SDN is to move the control planes to more than one server’s named controllers and limit the data planes to numerous sending network components, enabling flexible and dynamic network management. A distinctive characteristic of SDN is that it can logically centralize the control plane by utilizing many physical controllers. The deployment of the controller—that is, the controller placement problem (CPP)—becomes a vital model challenge. Through the advancements of blockchain technology, data integrity between nodes can be enhanced with no requirement for… More >

  • Open Access

    ARTICLE

    Cooperative Caching Strategy Based on Two-Layer Caching Model for Remote Sensing Satellite Networks

    Rui Xu1,2,3, Xiaoqiang Di1,3,4,*, Hao Luo1, Hui Qi1,3, Xiongwen He5, Wenping Lei6

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3903-3922, 2023, DOI:10.32604/cmc.2023.037054

    Abstract In Information Centric Networking (ICN) where content is the object of exchange, in-network caching is a unique functional feature with the ability to handle data storage and distribution in remote sensing satellite networks. Setting up cache space at any node enables users to access data nearby, thus relieving the processing pressure on the servers. However, the existing caching strategies still suffer from the lack of global planning of cache contents and low utilization of cache resources due to the lack of fine-grained division of cache contents. To address the issues mentioned, a cooperative caching strategy (CSTL) for remote sensing satellite… More >

  • Open Access

    ARTICLE

    Emerging Trends in Social Networking Systems and Generation Gap with Neutrosophic Crisp Soft Mapping

    Muhammad Riaz1, Masooma Raza Hashmi1, Faruk Karaaslan2, Aslıhan Sezgin3, Mohammed M. Ali Al Shamiri4,5,*, Mohammed M. Khalaf6,7

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1759-1783, 2023, DOI:10.32604/cmes.2023.023327

    Abstract This paper aims to introduce the novel concept of neutrosophic crisp soft set (NCSS), including various types of neutrosophic crisp soft sets (NCSSs) and their fundamental operations. We define NCS-mapping and its inverse NCS-mapping between two NCS-classes. We develop a robust mathematical modeling with the help of NCS-mapping to analyze the emerging trends in social networking systems (SNSs) for our various generations. We investigate the advantages, disadvantages, and natural aspects of SNSs for five generations. With the changing of the generations, it is analyzed that emerging trends and the benefits of SNSs are increasing day by day. The suggested modeling… More > Graphic Abstract

    Emerging Trends in Social Networking Systems and Generation Gap with Neutrosophic Crisp Soft Mapping

  • Open Access

    ARTICLE

    Latency-Aware Dynamic Second Offloading Service in SDN-Based Fog Architecture

    Samah Ibrahim AlShathri, Dina S. M. Hassan*, Samia Allaoua Chelloug

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1501-1526, 2023, DOI:10.32604/cmc.2023.035602

    Abstract Task offloading is a key strategy in Fog Computing (FC). The definition of resource-constrained devices no longer applies to sensors and Internet of Things (IoT) embedded system devices alone. Smart and mobile units can also be viewed as resource-constrained devices if the power, cloud applications, and data cloud are included in the set of required resources. In a cloud-fog-based architecture, a task instance running on an end device may need to be offloaded to a fog node to complete its execution. However, in a busy network, a second offloading decision is required when the fog node becomes overloaded. The possibility… More >

  • Open Access

    ARTICLE

    ProbD: Faulty Path Detection Based on Probability in Software-Defined Networking

    Jiangyuan Yao1, Jiawen Wang1, Shuhua Weng1, Minrui Wang1, Deshun Li1,*, Yahui Li2, Xingcan Cao3

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 1783-1796, 2023, DOI:10.32604/iasc.2023.034265

    Abstract With the increasing number of switches in Software-Defined Networking (SDN), there are more and more faults rising in the data plane. However, due to the existence of link redundancy and multi-path forwarding mechanisms, these problems cannot be detected in time. The current faulty path detection mechanisms have problems such as the large scale of detection and low efficiency, which is difficult to meet the requirements of efficient faulty path detection in large-scale SDN. Concerning this issue, we propose an efficient network path fault testing model ProbD based on probability detection. This model achieves a high probability of detecting arbitrary path… More >

  • Open Access

    ARTICLE

    Adaptive Partial Task Offloading and Virtual Resource Placement in SDN/NFV-Based Network Softwarization

    Prohim Tam1, Sa Math1, Seokhoon Kim1,2,*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2141-2154, 2023, DOI:10.32604/csse.2023.030984

    Abstract Edge intelligence brings the deployment of applied deep learning (DL) models in edge computing systems to alleviate the core backbone network congestions. The setup of programmable software-defined networking (SDN) control and elastic virtual computing resources within network functions virtualization (NFV) are cooperative for enhancing the applicability of intelligent edge softwarization. To offer advancement for multi-dimensional model task offloading in edge networks with SDN/NFV-based control softwarization, this study proposes a DL mechanism to recommend the optimal edge node selection with primary features of congestion windows, link delays, and allocatable bandwidth capacities. Adaptive partial task offloading policy considered the DL-based recommendation to… More >

  • Open Access

    ARTICLE

    Cross-Validation Convolution Neural Network-Based Algorithm for Automated Detection of Diabetic Retinopathy

    S. Sudha*, A. Srinivasan, T. Gayathri Devi

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1985-2000, 2023, DOI:10.32604/csse.2023.030960

    Abstract The substantial vision loss due to Diabetic Retinopathy (DR) mainly damages the blood vessels of the retina. These feature changes in the blood vessels fail to exist any manifestation in the eye at its initial stage, if this problem doesn’t exhibit initially, that leads to permanent blindness. So, this type of disorder can be only screened and identified through the processing of fundus images. The different stages in DR are Micro aneurysms (Ma), Hemorrhages (HE), and Exudates, and the stages in lesion show the chance of DR. For the advancement of early detection of DR in the eye we have… More >

  • Open Access

    ARTICLE

    Search and Rescue Optimization with Machine Learning Enabled Cybersecurity Model

    Hanan Abdullah Mengash1, Jaber S. Alzahrani2, Majdy M. Eltahir3, Fahd N. Al-Wesabi4, Abdullah Mohamed5, Manar Ahmed Hamza6,*, Radwa Marzouk7

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1393-1407, 2023, DOI:10.32604/csse.2023.030328

    Abstract Presently, smart cities play a vital role to enhance the quality of living among human beings in several ways such as online shopping, e-learning, e-healthcare, etc. Despite the benefits of advanced technologies, issues are also existed from the transformation of the physical word into digital word, particularly in online social networks (OSN). Cyberbullying (CB) is a major problem in OSN which needs to be addressed by the use of automated natural language processing (NLP) and machine learning (ML) approaches. This article devises a novel search and rescue optimization with machine learning enabled cybersecurity model for online social networks, named SRO-MLCOSN… More >

  • Open Access

    ARTICLE

    Anomaly Detection in Social Media Texts Using Optimal Convolutional Neural Network

    Swarna Sudha Muppudathi1, Valarmathi Krishnasamy2,*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 1027-1042, 2023, DOI:10.32604/iasc.2023.031165

    Abstract Social Networking Sites (SNSs) are nowadays utilized by the whole world to share ideas, images, and valuable contents by means of a post to reach a group of users. The use of SNS often inflicts the physical and the mental health of the people. Nowadays, researchers often focus on identifying the illegal behaviors in the SNS to reduce its negative influence. The state-of-art Natural Language processing techniques for anomaly detection have utilized a wide annotated corpus to identify the anomalies and they are often time-consuming as well as certainly do not guarantee maximum accuracy. To overcome these issues, the proposed… More >

  • Open Access

    ARTICLE

    Malicious Activities Prediction Over Online Social Networking Using Ensemble Model

    S. Sadhasivam1, P. Valarmathie2, K. Dinakaran3,*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 461-479, 2023, DOI:10.32604/iasc.2023.028650

    Abstract With the vast advancements in Information Technology, the emergence of Online Social Networking (OSN) has also hit its peak and captured the attention of the young generation people. The clone intends to replicate the users and inject massive malicious activities that pose a crucial security threat to the original user. However, the attackers also target this height of OSN utilization, explicitly creating the clones of the user’s account. Various clone detection mechanisms are designed based on social-network activities. For instance, monitoring the occurrence of clone edges is done to restrict the generation of clone activities. However, this assumption is unsuitable… More >

Displaying 11-20 on page 2 of 67. Per Page