Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (426)
  • Open Access

    ARTICLE

    Pedestrian and Vehicle Detection Based on Pruning YOLOv4 with Cloud-Edge Collaboration

    Huabin Wang1, Ruichao Mo2, Yuping Chen3, Weiwei Lin2,4,*, Minxian Xu5, Bo Liu3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.2, pp. 2025-2047, 2023, DOI:10.32604/cmes.2023.026910

    Abstract Nowadays, the rapid development of edge computing has driven an increasing number of deep learning applications deployed at the edge of the network, such as pedestrian and vehicle detection, to provide efficient intelligent services to mobile users. However, as the accuracy requirements continue to increase, the components of deep learning models for pedestrian and vehicle detection, such as YOLOv4, become more sophisticated and the computing resources required for model training are increasing dramatically, which in turn leads to significant challenges in achieving effective deployment on resource-constrained edge devices while ensuring the high accuracy performance. For addressing this challenge, a cloud-edge… More >

  • Open Access

    ARTICLE

    Anomaly Detection for Cloud Systems with Dynamic Spatiotemporal Learning

    Mingguang Yu1,2, Xia Zhang1,2,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1787-1806, 2023, DOI:10.32604/iasc.2023.038798

    Abstract As cloud system architectures evolve continuously, the interactions among distributed components in various roles become increasingly complex. This complexity makes it difficult to detect anomalies in cloud systems. The system status can no longer be determined through individual key performance indicators (KPIs) but through joint judgments based on synergistic relationships among distributed components. Furthermore, anomalies in modern cloud systems are usually not sudden crashes but rather gradual, chronic, localized failures or quality degradations in a weakly available state. Therefore, accurately modeling cloud systems and mining the hidden system state is crucial. To address this challenge, we propose an anomaly detection… More >

  • Open Access

    ARTICLE

    Anomaly Detection and Access Control for Cloud-Edge Collaboration Networks

    Bingcheng Jiang, Qian He*, Zhongyi Zhai, Hang Su

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2335-2353, 2023, DOI:10.32604/iasc.2023.039989

    Abstract Software-defined networking (SDN) enables the separation of control and data planes, allowing for centralized control and management of the network. Without adequate access control methods, the risk of unauthorized access to the network and its resources increases significantly. This can result in various security breaches. In addition, if authorized devices are attacked or controlled by hackers, they may turn into malicious devices, which can cause severe damage to the network if their abnormal behaviour goes undetected and their access privileges are not promptly restricted. To solve those problems, an anomaly detection and access control mechanism based on SDN and neural… More >

  • Open Access

    ARTICLE

    Real-Time Multi Fractal Trust Evaluation Model for Efficient Intrusion Detection in Cloud

    S. Priya1, R. S. Ponmagal2,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1895-1907, 2023, DOI:10.32604/iasc.2023.039814

    Abstract Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks. To address such threats towards cloud services, numerous techniques exist that mitigate the service threats according to different metrics. The rule-based approaches are unsuitable for new threats, whereas trust-based systems estimate trust value based on behavior, flow, and other features. However, the methods suffer from mitigating intrusion attacks at a higher rate. This article presents a novel Multi Fractal Trust Evaluation Model (MFTEM) to overcome these deficiencies. The method involves analyzing service growth,… More >

  • Open Access

    ARTICLE

    Hyper-Heuristic Task Scheduling Algorithm Based on Reinforcement Learning in Cloud Computing

    Lei Yin1, Chang Sun2, Ming Gao3, Yadong Fang4, Ming Li1, Fengyu Zhou1,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1587-1608, 2023, DOI:10.32604/iasc.2023.039380

    Abstract The solution strategy of the heuristic algorithm is pre-set and has good performance in the conventional cloud resource scheduling process. However, for complex and dynamic cloud service scheduling tasks, due to the difference in service attributes, the solution efficiency of a single strategy is low for such problems. In this paper, we presents a hyper-heuristic algorithm based on reinforcement learning (HHRL) to optimize the completion time of the task sequence. Firstly, In the reward table setting stage of HHRL, we introduce population diversity and integrate maximum time to comprehensively determine the task scheduling and the selection of low-level heuristic strategies.… More >

  • Open Access

    ARTICLE

    QoS-Aware Cloud Service Optimization Algorithm in Cloud Manufacturing Environment

    Wenlong Ma1,2,*, Youhong Xu1, Jianwei Zheng2, Sadaqat ur Rehman3

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1499-1512, 2023, DOI:10.32604/iasc.2023.030484

    Abstract In a cloud manufacturing environment with abundant functionally equivalent cloud services, users naturally desire the highest-quality service(s). Thus, a comprehensive measurement of quality of service (QoS) is needed. Optimizing the plethora of cloud services has thus become a top priority. Cloud service optimization is negatively affected by untrusted QoS data, which are inevitably provided by some users. To resolve these problems, this paper proposes a QoS-aware cloud service optimization model and establishes QoS-information awareness and quantification mechanisms. Untrusted data are assessed by an information correction method. The weights discovered by the variable precision Rough Set, which mined the evaluation indicators… More >

  • Open Access

    ARTICLE

    Anatomical Feature Segmentation of Femur Point Cloud Based on Medical Semantics

    Xiaozhong Chen*

    Molecular & Cellular Biomechanics, Vol.20, No.1, pp. 1-14, 2023, DOI:10.32604/mcb.2022.026964

    Abstract Feature segmentation is an essential phase for geometric modeling and shape processing in anatomical study of human skeleton and clinical digital treatment of orthopedics. Due to various degrees of freedom of bone surface, the existing segmentation algorithms can hardly meet specific medical need. To address this, a novel segmentation methodology for anatomical features of femur model based on medical semantics is put forward. First, anatomical reference objects (ARO) are created to represent typical characteristics of femur anatomy by 3D point fitting in combination with medical priori knowledge. Then, local point clouds between adjacent anatomies are selected according to the AROs… More >

  • Open Access

    ARTICLE

    Hidden Hierarchy Based on Cipher-Text Attribute Encryption for IoT Data Privacy in Cloud

    Zaid Abdulsalam Ibrahim1,*, Muhammad Ilyas2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 939-956, 2023, DOI:10.32604/cmc.2023.035798

    Abstract Most research works nowadays deal with real-time Internet of Things (IoT) data. However, with exponential data volume increases, organizations need help storing such humongous amounts of IoT data in cloud storage systems. Moreover, such systems create security issues while efficiently using IoT and Cloud Computing technologies. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has the potential to make IoT data more secure and reliable in various cloud storage services. Cloud-assisted IoTs suffer from two privacy issues: access policies (public) and super polynomial decryption times (attributed mainly to complex access structures). We have developed a CP-ABE scheme in alignment with a Hidden Hierarchy Ciphertext-Policy… More >

  • Open Access

    ARTICLE

    Virtual Machine Consolidation with Multi-Step Prediction and Affinity-Aware Technique for Energy-Efficient Cloud Data Centers

    Pingping Li*, Jiuxin Cao

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 81-105, 2023, DOI:10.32604/cmc.2023.039076

    Abstract Virtual machine (VM) consolidation is an effective way to improve resource utilization and reduce energy consumption in cloud data centers. Most existing studies have considered VM consolidation as a bin-packing problem, but the current schemes commonly ignore the long-term relationship between VMs and hosts. In addition, there is a lack of long-term consideration for resource optimization in the VM consolidation, which results in unnecessary VM migration and increased energy consumption. To address these limitations, a VM consolidation method based on multi-step prediction and affinity-aware technique for energy-efficient cloud data centers (MPaAFVMC) is proposed. The proposed method uses an improved linear… More >

  • Open Access

    ARTICLE

    Energy and Latency Optimization in Edge-Fog-Cloud Computing for the Internet of Medical Things

    Hatem A. Alharbi1, Barzan A. Yosuf2, Mohammad Aldossary3,*, Jaber Almutairi4

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1299-1319, 2023, DOI:10.32604/csse.2023.039367

    Abstract In this paper, the Internet of Medical Things (IoMT) is identified as a promising solution, which integrates with the cloud computing environment to provide remote health monitoring solutions and improve the quality of service (QoS) in the healthcare sector. However, problems with the present architectural models such as those related to energy consumption, service latency, execution cost, and resource usage, remain a major concern for adopting IoMT applications. To address these problems, this work presents a four-tier IoMT-edge-fog-cloud architecture along with an optimization model formulated using Mixed Integer Linear Programming (MILP), with the objective of efficiently processing and placing IoMT… More >

Displaying 41-50 on page 5 of 426. Per Page