Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (452)
  • Open Access

    ARTICLE

    Maximizing Resource Efficiency in Cloud Data Centers through Knowledge-Based Flower Pollination Algorithm (KB-FPA)

    Nidhika Chauhan1, Navneet Kaur2, Kamaljit Singh Saini3, Sahil Verma3, Kavita3, Ruba Abu Khurma4,5, Pedro A. Castillo6,*

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 3757-3782, 2024, DOI:10.32604/cmc.2024.046516

    Abstract Cloud computing is a dynamic and rapidly evolving field, where the demand for resources fluctuates continuously. This paper delves into the imperative need for adaptability in the allocation of resources to applications and services within cloud computing environments. The motivation stems from the pressing issue of accommodating fluctuating levels of user demand efficiently. By adhering to the proposed resource allocation method, we aim to achieve a substantial reduction in energy consumption. This reduction hinges on the precise and efficient allocation of resources to the tasks that require those most, aligning with the broader goal of… More >

  • Open Access

    REVIEW

    A Systematic Literature Review on Task Allocation and Performance Management Techniques in Cloud Data Center

    Nidhika Chauhan1, Navneet Kaur2, Kamaljit Singh Saini2, Sahil Verma3, Abdulatif Alabdulatif4, Ruba Abu Khurma5,7, Maribel Garcia-Arenas6, Pedro A. Castillo6,*

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 571-608, 2024, DOI:10.32604/csse.2024.042690

    Abstract As cloud computing usage grows, cloud data centers play an increasingly important role. To maximize resource utilization, ensure service quality, and enhance system performance, it is crucial to allocate tasks and manage performance effectively. The purpose of this study is to provide an extensive analysis of task allocation and performance management techniques employed in cloud data centers. The aim is to systematically categorize and organize previous research by identifying the cloud computing methodologies, categories, and gaps. A literature review was conducted, which included the analysis of 463 task allocations and 480 performance management papers. The… More >

  • Open Access

    ARTICLE

    Preserving Data Secrecy and Integrity for Cloud Storage Using Smart Contracts and Cryptographic Primitives

    Maher Alharby*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2449-2463, 2024, DOI:10.32604/cmc.2024.050425

    Abstract Cloud computing has emerged as a viable alternative to traditional computing infrastructures, offering various benefits. However, the adoption of cloud storage poses significant risks to data secrecy and integrity. This article presents an effective mechanism to preserve the secrecy and integrity of data stored on the public cloud by leveraging blockchain technology, smart contracts, and cryptographic primitives. The proposed approach utilizes a Solidity-based smart contract as an auditor for maintaining and verifying the integrity of outsourced data. To preserve data secrecy, symmetric encryption systems are employed to encrypt user data before outsourcing it. An extensive More >

  • Open Access

    ARTICLE

    Enhanced Hybrid Equilibrium Strategy in Fog-Cloud Computing Networks with Optimal Task Scheduling

    Muchang Rao, Hang Qin*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 2647-2672, 2024, DOI:10.32604/cmc.2024.050380

    Abstract More devices in the Intelligent Internet of Things (AIoT) result in an increased number of tasks that require low latency and real-time responsiveness, leading to an increased demand for computational resources. Cloud computing’s low-latency performance issues in AIoT scenarios have led researchers to explore fog computing as a complementary extension. However, the effective allocation of resources for task execution within fog environments, characterized by limitations and heterogeneity in computational resources, remains a formidable challenge. To tackle this challenge, in this study, we integrate fog computing and cloud computing. We begin by establishing a fog-cloud environment… More >

  • Open Access

    ARTICLE

    A Novel Scheduling Framework for Multi-Programming Quantum Computing in Cloud Environment

    Danyang Zheng, Jinchen Xv, Feng Yue, Qiming Du, Zhiheng Wang, Zheng Shan*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 1957-1974, 2024, DOI:10.32604/cmc.2024.048956

    Abstract As cloud quantum computing gains broader acceptance, a growing quantity of researchers are directing their focus towards this domain. Nevertheless, the rapid surge in demand for cloud-based quantum computing resources has led to a scarcity, which in turn hampers users from achieving optimal satisfaction. Therefore, cloud quantum computing service providers require a unified analysis and scheduling framework for their quantum resources and user jobs to meet the ever-growing usage demands. This paper introduces a new multi-programming scheduling framework for quantum computing in a cloud environment. The framework addresses the issue of limited quantum computing resources More >

  • Open Access

    ARTICLE

    Fortifying Healthcare Data Security in the Cloud: A Comprehensive Examination of the EPM-KEA Encryption Protocol

    Umi Salma Basha1, Shashi Kant Gupta2, Wedad Alawad3, SeongKi Kim4,*, Salil Bharany5,*

    CMC-Computers, Materials & Continua, Vol.79, No.2, pp. 3397-3416, 2024, DOI:10.32604/cmc.2024.046265

    Abstract A new era of data access and management has begun with the use of cloud computing in the healthcare industry. Despite the efficiency and scalability that the cloud provides, the security of private patient data is still a major concern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentiality and integrity of healthcare data in the cloud. The computational overhead of encryption technologies could lead to delays in data access and processing rates. To address these challenges, we introduced the Enhanced Parallel Multi-Key Encryption Algorithm (EPM-KEA), aiming to bolster… More >

  • Open Access

    ARTICLE

    Securing Cloud-Encrypted Data: Detecting Ransomware-as-a-Service (RaaS) Attacks through Deep Learning Ensemble

    Amardeep Singh1, Hamad Ali Abosaq2, Saad Arif3, Zohaib Mushtaq4,*, Muhammad Irfan5, Ghulam Abbas6, Arshad Ali7, Alanoud Al Mazroa8

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 857-873, 2024, DOI:10.32604/cmc.2024.048036

    Abstract Data security assurance is crucial due to the increasing prevalence of cloud computing and its widespread use across different industries, especially in light of the growing number of cybersecurity threats. A major and ever-present threat is Ransomware-as-a-Service (RaaS) assaults, which enable even individuals with minimal technical knowledge to conduct ransomware operations. This study provides a new approach for RaaS attack detection which uses an ensemble of deep learning models. For this purpose, the network intrusion detection dataset “UNSW-NB15” from the Intelligent Security Group of the University of New South Wales, Australia is analyzed. In the… More >

  • Open Access

    ARTICLE

    A Random Fusion of Mix3D and PolarMix to Improve Semantic Segmentation Performance in 3D Lidar Point Cloud

    Bo Liu1,2, Li Feng1,*, Yufeng Chen3

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 845-862, 2024, DOI:10.32604/cmes.2024.047695

    Abstract This paper focuses on the effective utilization of data augmentation techniques for 3D lidar point clouds to enhance the performance of neural network models. These point clouds, which represent spatial information through a collection of 3D coordinates, have found wide-ranging applications. Data augmentation has emerged as a potent solution to the challenges posed by limited labeled data and the need to enhance model generalization capabilities. Much of the existing research is devoted to crafting novel data augmentation methods specifically for 3D lidar point clouds. However, there has been a lack of focus on making the… More >

  • Open Access

    ARTICLE

    Modularized and Parametric Modeling Technology for Finite Element Simulations of Underground Engineering under Complicated Geological Conditions

    Jiaqi Wu1, Li Zhuo1,*, Jianliang Pei1, Yao Li2, Hongqiang Xie1, Jiaming Wu1, Huaizhong Liu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 621-645, 2024, DOI:10.32604/cmes.2024.046398

    Abstract The surrounding geological conditions and supporting structures of underground engineering are often updated during construction, and these updates require repeated numerical modeling. To improve the numerical modeling efficiency of underground engineering, a modularized and parametric modeling cloud server is developed by using Python codes. The basic framework of the cloud server is as follows: input the modeling parameters into the web platform, implement Rhino software and FLAC3D software to model and run simulations in the cloud server, and return the simulation results to the web platform. The modeling program can automatically generate instructions that can run… More >

  • Open Access

    ARTICLE

    Securing Mobile Cloud-Based Electronic Health Records: A Blockchain-Powered Cryptographic Solution with Enhanced Privacy and Efficiency

    Umer Nauman1, Yuhong Zhang2, Zhihui Li3, Tong Zhen1,3,*

    Journal of Intelligent Medicine and Healthcare, Vol.2, pp. 15-34, 2024, DOI:10.32604/jimh.2024.048784

    Abstract The convergence of handheld devices and cloud-based computing has transformed how Electronic Health Records (EHRs) are stored in mobile cloud paradigms, offering benefits such as affordability, adaptability, and portability. However, it also introduces challenges regarding network security and data confidentiality, as it aims to exchange EHRs among mobile users while maintaining high levels of security. This study proposes an innovative blockchain-based solution to these issues and presents secure cloud storage for healthcare data. To provide enhanced cryptography, the proposed method combines an enhanced Blowfish encryption method with a new key generation technique called Elephant Herding… More >

Displaying 21-30 on page 3 of 452. Per Page