Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (431)
  • Open Access

    ARTICLE

    QoS-Aware Cloud Service Optimization Algorithm in Cloud Manufacturing Environment

    Wenlong Ma1,2,*, Youhong Xu1, Jianwei Zheng2, Sadaqat ur Rehman3

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1499-1512, 2023, DOI:10.32604/iasc.2023.030484

    Abstract In a cloud manufacturing environment with abundant functionally equivalent cloud services, users naturally desire the highest-quality service(s). Thus, a comprehensive measurement of quality of service (QoS) is needed. Optimizing the plethora of cloud services has thus become a top priority. Cloud service optimization is negatively affected by untrusted QoS data, which are inevitably provided by some users. To resolve these problems, this paper proposes a QoS-aware cloud service optimization model and establishes QoS-information awareness and quantification mechanisms. Untrusted data are assessed by an information correction method. The weights discovered by the variable precision Rough Set, which mined the evaluation indicators… More >

  • Open Access

    ARTICLE

    Anatomical Feature Segmentation of Femur Point Cloud Based on Medical Semantics

    Xiaozhong Chen*

    Molecular & Cellular Biomechanics, Vol.20, No.1, pp. 1-14, 2023, DOI:10.32604/mcb.2022.026964

    Abstract Feature segmentation is an essential phase for geometric modeling and shape processing in anatomical study of human skeleton and clinical digital treatment of orthopedics. Due to various degrees of freedom of bone surface, the existing segmentation algorithms can hardly meet specific medical need. To address this, a novel segmentation methodology for anatomical features of femur model based on medical semantics is put forward. First, anatomical reference objects (ARO) are created to represent typical characteristics of femur anatomy by 3D point fitting in combination with medical priori knowledge. Then, local point clouds between adjacent anatomies are selected according to the AROs… More >

  • Open Access

    ARTICLE

    Hidden Hierarchy Based on Cipher-Text Attribute Encryption for IoT Data Privacy in Cloud

    Zaid Abdulsalam Ibrahim1,*, Muhammad Ilyas2

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 939-956, 2023, DOI:10.32604/cmc.2023.035798

    Abstract Most research works nowadays deal with real-time Internet of Things (IoT) data. However, with exponential data volume increases, organizations need help storing such humongous amounts of IoT data in cloud storage systems. Moreover, such systems create security issues while efficiently using IoT and Cloud Computing technologies. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has the potential to make IoT data more secure and reliable in various cloud storage services. Cloud-assisted IoTs suffer from two privacy issues: access policies (public) and super polynomial decryption times (attributed mainly to complex access structures). We have developed a CP-ABE scheme in alignment with a Hidden Hierarchy Ciphertext-Policy… More >

  • Open Access

    ARTICLE

    Virtual Machine Consolidation with Multi-Step Prediction and Affinity-Aware Technique for Energy-Efficient Cloud Data Centers

    Pingping Li*, Jiuxin Cao

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 81-105, 2023, DOI:10.32604/cmc.2023.039076

    Abstract Virtual machine (VM) consolidation is an effective way to improve resource utilization and reduce energy consumption in cloud data centers. Most existing studies have considered VM consolidation as a bin-packing problem, but the current schemes commonly ignore the long-term relationship between VMs and hosts. In addition, there is a lack of long-term consideration for resource optimization in the VM consolidation, which results in unnecessary VM migration and increased energy consumption. To address these limitations, a VM consolidation method based on multi-step prediction and affinity-aware technique for energy-efficient cloud data centers (MPaAFVMC) is proposed. The proposed method uses an improved linear… More >

  • Open Access

    ARTICLE

    Energy and Latency Optimization in Edge-Fog-Cloud Computing for the Internet of Medical Things

    Hatem A. Alharbi1, Barzan A. Yosuf2, Mohammad Aldossary3,*, Jaber Almutairi4

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1299-1319, 2023, DOI:10.32604/csse.2023.039367

    Abstract In this paper, the Internet of Medical Things (IoMT) is identified as a promising solution, which integrates with the cloud computing environment to provide remote health monitoring solutions and improve the quality of service (QoS) in the healthcare sector. However, problems with the present architectural models such as those related to energy consumption, service latency, execution cost, and resource usage, remain a major concern for adopting IoMT applications. To address these problems, this work presents a four-tier IoMT-edge-fog-cloud architecture along with an optimization model formulated using Mixed Integer Linear Programming (MILP), with the objective of efficiently processing and placing IoMT… More >

  • Open Access

    ARTICLE

    Securing Cloud Computing from Flash Crowd Attack Using Ensemble Intrusion Detection System

    Turke Althobaiti1,2, Yousef Sanjalawe3,*, Naeem Ramzan4

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 453-469, 2023, DOI:10.32604/csse.2023.039207

    Abstract Flash Crowd attacks are a form of Distributed Denial of Service (DDoS) attack that is becoming increasingly difficult to detect due to its ability to imitate normal user behavior in Cloud Computing (CC). Botnets are often used by attackers to perform a wide range of DDoS attacks. With advancements in technology, bots are now able to simulate DDoS attacks as flash crowd events, making them difficult to detect. When it comes to application layer DDoS attacks, the Flash Crowd attack that occurs during a Flash Event is viewed as the most intricate issue. This is mainly because it can imitate… More >

  • Open Access

    ARTICLE

    A Lightweight Approach (BL-DAC) to Secure Storage Sharing in Cloud-IoT Environments

    Zakariae Dlimi*, Abdellah Ezzati, Said Ben Alla

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 79-103, 2023, DOI:10.32604/csse.2023.037099

    Abstract The growing advent of the Internet of Things (IoT) users is driving the adoption of cloud computing technologies. The integration of IoT in the cloud enables storage and computational capabilities for IoT users. However, security has been one of the main concerns of cloud-integrated IoT. Existing work attempts to address the security concerns of cloud-integrated IoT through authentication, access control, and blockchain-based methods. However, existing frameworks are somewhat limited by scalability, privacy, and centralized structures. To mitigate the existing problems, we propose a blockchain-based distributed access control method for secure storage in the IoT cloud (BL-DAC). Initially, the BL-DAC performs… More >

  • Open Access

    ARTICLE

    Hybrid Chameleon and Honey Badger Optimization Algorithm for QoS-Based Cloud Service Composition Problem

    G. Manimala*, A. Chinnasamy

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 393-412, 2023, DOI:10.32604/csse.2023.037066

    Abstract Cloud computing facilitates the great potentiality of storing and managing remote access to services in terms of software as a service (SaaS). Several organizations have moved towards outsourcing over the cloud to reduce the burden on local resources. In this context, the metaheuristic optimization method is determined to be highly suitable for selecting appropriate services that comply with the requirements of the client’s requests, as the services stored over the cloud are too complex and scalable. To achieve better service composition, the parameters of Quality of Service (QoS) related to each service considered to be the best resource need to… More >

  • Open Access

    ARTICLE

    Machine Learning Based Cybersecurity Threat Detection for Secure IoT Assisted Cloud Environment

    Z. Faizal Khan1, Saeed M. Alshahrani2,*, Abdulrahman Alghamdi2, Someah Alangari3, Nouf Ibrahim Altamami4, Khalid A. Alissa5, Sana Alazwari6, Mesfer Al Duhayyim7, Fahd N. Al-Wesabi8

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 855-871, 2023, DOI:10.32604/csse.2023.036735

    Abstract The Internet of Things (IoT) is determine enormous economic openings for industries and allow stimulating innovation which obtain between domains in childcare for eldercare, in health service to energy, and in developed to transport. Cybersecurity develops a difficult problem in IoT platform whereas the presence of cyber-attack requires that solved. The progress of automatic devices for cyber-attack classifier and detection employing Artificial Intelligence (AI) and Machine Learning (ML) devices are crucial fact to realize security in IoT platform. It can be required for minimizing the issues of security based on IoT devices efficiently. Thus, this research proposal establishes novel mayfly… More >

  • Open Access

    ARTICLE

    Adaptive Butterfly Optimization Algorithm (ABOA) Based Feature Selection and Deep Neural Network (DNN) for Detection of Distributed Denial-of-Service (DDoS) Attacks in Cloud

    S. Sureshkumar1,*, G .K. D. Prasanna Venkatesan2, R. Santhosh3

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1109-1123, 2023, DOI:10.32604/csse.2023.036267

    Abstract Cloud computing technology provides flexible, on-demand, and completely controlled computing resources and services are highly desirable. Despite this, with its distributed and dynamic nature and shortcomings in virtualization deployment, the cloud environment is exposed to a wide variety of cyber-attacks and security difficulties. The Intrusion Detection System (IDS) is a specialized security tool that network professionals use for the safety and security of the networks against attacks launched from various sources. DDoS attacks are becoming more frequent and powerful, and their attack pathways are continually changing, which requiring the development of new detection methods. Here the purpose of the study… More >

Displaying 51-60 on page 6 of 431. Per Page