Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (233)
  • Open Access

    ARTICLE

    Reliable Failure Restoration with Bayesian Congestion Aware for Software Defined Networks

    Babangida Isyaku1,2,*, Kamalrulnizam Bin Abu Bakar1, Wamda Nagmeldin3, Abdelzahir Abdelmaboud4, Faisal Saeed5,6, Fuad A. Ghaleb1

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3729-3748, 2023, DOI:10.32604/csse.2023.034509

    Abstract Software Defined Networks (SDN) introduced better network management by decoupling control and data plane. However, communication reliability is the desired property in computer networks. The frequency of communication link failure degrades network performance, and service disruptions are likely to occur. Emerging network applications, such as delay-sensitive applications, suffer packet loss with higher Round Trip Time (RTT). Several failure recovery schemes have been proposed to address link failure recovery issues in SDN. However, these schemes have various weaknesses, which may not always guarantee service availability. Communication paths differ in their roles; some paths are critical because of the higher frequency usage.… More >

  • Open Access

    ARTICLE

    Data Center Traffic Scheduling Strategy for Minimization Congestion and Quality of Service Guaranteeing

    Chunzhi Wang, Weidong Cao*, Yalin Hu, Jinhang Liu

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4377-4393, 2023, DOI:10.32604/cmc.2023.037625

    Abstract According to Cisco’s Internet Report 2020 white paper, there will be 29.3 billion connected devices worldwide by 2023, up from 18.4 billion in 2018. 5G connections will generate nearly three times more traffic than 4G connections. While bringing a boom to the network, it also presents unprecedented challenges in terms of flow forwarding decisions. The path assignment mechanism used in traditional traffic scheduling methods tends to cause local network congestion caused by the concentration of elephant flows, resulting in unbalanced network load and degraded quality of service. Using the centralized control of software-defined networks, this study proposes a data center… More >

  • Open Access

    ARTICLE

    SMINER: Detecting Unrestricted and Misimplemented Behaviors of Software Systems Based on Unit Test Cases

    Kyungmin Sim, Jeong Hyun Yi, Haehyun Cho*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3257-3274, 2023, DOI:10.32604/cmc.2023.036695

    Abstract Despite the advances in automated vulnerability detection approaches, security vulnerabilities caused by design flaws in software systems are continuously appearing in real-world systems. Such security design flaws can bring unrestricted and misimplemented behaviors of a system and can lead to fatal vulnerabilities such as remote code execution or sensitive data leakage. Therefore, it is an essential task to discover unrestricted and misimplemented behaviors of a system. However, it is a daunting task for security experts to discover such vulnerabilities in advance because it is time-consuming and error-prone to analyze the whole code in detail. Also, most of the existing vulnerability… More >

  • Open Access

    ARTICLE

    Identifying Counterexamples Without Variability in Software Product Line Model Checking

    Ling Ding1, Hongyan Wan2,*, Luokai Hu1, Yu Chen1

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2655-2670, 2023, DOI:10.32604/cmc.2023.035542

    Abstract Product detection based on state abstraction technologies in the software product line (SPL) is more complex when compared to a single system. This variability constitutes a new complexity, and the counterexample may be valid for some products but spurious for others. In this paper, we found that spurious products are primarily due to the failure states, which correspond to the spurious counterexamples. The violated products correspond to the real counterexamples. Hence, identifying counterexamples is a critical problem in detecting violated products. In our approach, we obtain the violated products through the genuine counterexamples, which have no failure state, to avoid… More >

  • Open Access

    ARTICLE

    WiMA: Towards a Multi-Criterion Association in Software Defined Wi-Fi Networks

    Sohaib Manzoor1, Hira Manzoor2, Saddaf Rubab3,4, Muhammad Attique Khan5, Majed Alhaisoni6, Abdullah Alqahtani7, Ye Jin Kim8, Byoungchol Chang9,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2347-2363, 2023, DOI:10.32604/cmc.2023.034044

    Abstract Despite the planned installation and operations of the traditional IEEE 802.11 networks, they still experience degraded performance due to the number of inefficiencies. One of the main reasons is the received signal strength indicator (RSSI) association problem, in which the user remains connected to the access point (AP) unless the RSSI becomes too weak. In this paper, we propose a multi-criterion association (WiMA) scheme based on software defined networking (SDN) in Wi-Fi networks. An association solution based on multi-criterion such as AP load, RSSI, and channel occupancy is proposed to satisfy the quality of service (QoS). SDN having an overall… More >

  • Open Access

    ARTICLE

    An IoT Environment Based Framework for Intelligent Intrusion Detection

    Hamza Safwan1, Zeshan Iqbal1, Rashid Amin1, Muhammad Attique Khan2, Majed Alhaisoni3, Abdullah Alqahtani4, Ye Jin Kim5, Byoungchol Chang6,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2365-2381, 2023, DOI:10.32604/cmc.2023.033896

    Abstract Software-defined networking (SDN) represents a paradigm shift in network traffic management. It distinguishes between the data and control planes. APIs are then used to communicate between these planes. The controller is central to the management of an SDN network and is subject to security concerns. This research shows how a deep learning algorithm can detect intrusions in SDN-based IoT networks. Overfitting, low accuracy, and efficient feature selection is all discussed. We propose a hybrid machine learning-based approach based on Random Forest and Long Short-Term Memory (LSTM). In this study, a new dataset based specifically on Software Defined Networks is used… More >

  • Open Access

    ARTICLE

    Enhanced Crow Search with Deep Learning-Based Cyberattack Detection in SDN-IoT Environment

    Abdelwahed Motwakel1,*, Fadwa Alrowais2, Khaled Tarmissi3, Radwa Marzouk4, Abdullah Mohamed5, Abu Sarwar Zamani1, Ishfaq Yaseen1, Mohamed I. Eldesouki6

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3157-3173, 2023, DOI:10.32604/iasc.2023.034908

    Abstract The paradigm shift towards the Internet of Things (IoT) phenomenon and the rise of edge-computing models provide massive potential for several upcoming IoT applications like smart grid, smart energy, smart home, smart health and smart transportation services. However, it also provides a sequence of novel cyber-security issues. Although IoT networks provide several advantages, the heterogeneous nature of the network and the wide connectivity of the devices make the network easy for cyber-attackers. Cyberattacks result in financial loss and data breaches for organizations and individuals. So, it becomes crucial to secure the IoT environment from such cyberattacks. With this motivation, the… More >

  • Open Access

    ARTICLE

    Implementation of Hybrid Particle Swarm Optimization for Optimized Regression Testing

    V. Prakash*, S. Gopalakrishnan

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2575-2590, 2023, DOI:10.32604/iasc.2023.032122

    Abstract Software test case optimization improves the efficiency of the software by proper structure and reduces the fault in the software. The existing research applies various optimization methods such as Genetic Algorithm, Crow Search Algorithm, Ant Colony Optimization, etc., for test case optimization. The existing methods have limitations of lower efficiency in fault diagnosis, higher computational time, and high memory requirement. The existing methods have lower efficiency in software test case optimization when the number of test cases is high. This research proposes the Tournament Winner Genetic Algorithm (TW-GA) method to improve the efficiency of software test case optimization. Hospital Information… More >

  • Open Access

    ARTICLE

    Novel Metrics for Mutation Analysis

    Savas Takan1,*, Gokmen Katipoglu2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2075-2089, 2023, DOI:10.32604/csse.2023.036791

    Abstract A measure of the “goodness” or efficiency of the test suite is used to determine the proficiency of a test suite. The appropriateness of the test suite is determined through mutation analysis. Several Finite State Machine (FSM) mutants are produced in mutation analysis by injecting errors against hypotheses. These mutants serve as test subjects for the test suite (TS). The effectiveness of the test suite is proportional to the number of eliminated mutants. The most effective test suite is the one that removes the most significant number of mutants at the optimal time. It is difficult to determine the fault… More >

  • Open Access

    ARTICLE

    A Simple and Efficient Structural Topology Optimization Implementation Using Open-Source Software for All Steps of the Algorithm: Modeling, Sensitivity Analysis and Optimization

    Rafael Marin Ferro1,2,*, Renato Pavanello2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1371-1397, 2023, DOI:10.32604/cmes.2023.026043

    Abstract This work analyzes the implementation of a continuous method of structural topology optimization (STO) using open-source software for all stages of the topology optimization problem: modeling, sensitivity analysis and optimization. Its implementation involves three main components: numerical analysis using the Finite Element Method (FEM), sensitivity analysis using an Adjoint method and an optimization solver. In order to allow the automated numerical solution of Partial Differential Equations (PDEs) and perform a sensitivity analysis, FEniCS and Dolfin Adjoint software are used as tools, which are open-source code. For the optimization process, Ipopt (Interior Point OPTimizer) is used, which is a software package… More >

Displaying 41-50 on page 5 of 233. Per Page