Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (535)
  • Open Access

    ARTICLE

    Modified Neural Network Used for Host Utilization Predication in Cloud Computing Environment

    Arif Ullah1, Siti Fatimah Abdul Razak2,*, Sumendra Yogarayan2, Md Shohel Sayeed2

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 5185-5204, 2025, DOI:10.32604/cmc.2025.059355 - 06 March 2025

    Abstract Networking, storage, and hardware are just a few of the virtual computing resources that the infrastructure service model offers, depending on what the client needs. One essential aspect of cloud computing that improves resource allocation techniques is host load prediction. This difficulty means that hardware resource allocation in cloud computing still results in hosting initialization issues, which add several minutes to response times. To solve this issue and accurately predict cloud capacity, cloud data centers use prediction algorithms. This permits dynamic cloud scalability while maintaining superior service quality. For host prediction, we therefore present a… More >

  • Open Access

    ARTICLE

    Drone-Based Public Surveillance Using 3D Point Clouds and Neuro-Fuzzy Classifier

    Yawar Abbas1, Aisha Ahmed Alarfaj2, Ebtisam Abdullah Alabdulqader3, Asaad Algarni4, Ahmad Jalal1,5, Hui Liu6,*

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4759-4776, 2025, DOI:10.32604/cmc.2025.059224 - 06 March 2025

    Abstract Human Activity Recognition (HAR) in drone-captured videos has become popular because of the interest in various fields such as video surveillance, sports analysis, and human-robot interaction. However, recognizing actions from such videos poses the following challenges: variations of human motion, the complexity of backdrops, motion blurs, occlusions, and restricted camera angles. This research presents a human activity recognition system to address these challenges by working with drones’ red-green-blue (RGB) videos. The first step in the proposed system involves partitioning videos into frames and then using bilateral filtering to improve the quality of object foregrounds while… More >

  • Open Access

    ARTICLE

    A Bioinspired Method for Optimal Task Scheduling in Fog-Cloud Environment

    Ferzat Anka1, Ghanshyam G. Tejani2,3,*, Sunil Kumar Sharma4, Mohammed Baljon5

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.3, pp. 2691-2724, 2025, DOI:10.32604/cmes.2025.061522 - 03 March 2025

    Abstract Due to the intense data flow in expanding Internet of Things (IoT) applications, a heavy processing cost and workload on the fog-cloud side become inevitable. One of the most critical challenges is optimal task scheduling. Since this is an NP-hard problem type, a metaheuristic approach can be a good option. This study introduces a novel enhancement to the Artificial Rabbits Optimization (ARO) algorithm by integrating Chaotic maps and Levy flight strategies (CLARO). This dual approach addresses the limitations of standard ARO in terms of population diversity and convergence speed. It is designed for task scheduling… More >

  • Open Access

    ARTICLE

    Cloud-Based Deep Learning for Real-Time URL Anomaly Detection: LSTM/GRU and CNN/LSTM Models

    Ayman Noor*

    Computer Systems Science and Engineering, Vol.49, pp. 259-286, 2025, DOI:10.32604/csse.2025.060387 - 21 February 2025

    Abstract Precisely forecasting the performance of Deep Learning (DL) models, particularly in critical areas such as Uniform Resource Locator (URL)-based threat detection, aids in improving systems developed for difficult tasks. In cybersecurity, recognizing harmful URLs is vital to lowering risks associated with phishing, malware, and other online-based attacks. Since it directly affects the model’s capacity to differentiate between benign and harmful URLs, finding the optimum mix of hyperparameters in DL models is a significant difficulty. Two commonly used architectures for sequential and spatial data processing, Long Short-Term Memory (LSTM)/Gated Recurrent Unit (GRU) and Convolutional Neural Network… More >

  • Open Access

    ARTICLE

    GPU Usage Time-Based Ordering Management Technique for Tasks Execution to Prevent Running Failures of GPU Tasks in Container Environments

    Joon-Min Gil1, Hyunsu Jeong1, Jihun Kang2,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2199-2213, 2025, DOI:10.32604/cmc.2025.061182 - 17 February 2025

    Abstract In a cloud environment, graphics processing units (GPUs) are the primary devices used for high-performance computation. They exploit flexible resource utilization, a key advantage of cloud environments. Multiple users share GPUs, which serve as coprocessors of central processing units (CPUs) and are activated only if tasks demand GPU computation. In a container environment, where resources can be shared among multiple users, GPU utilization can be increased by minimizing idle time because the tasks of many users run on a single GPU. However, unlike CPUs and memory, GPUs cannot logically multiplex their resources. Additionally, GPU memory… More >

  • Open Access

    ARTICLE

    A Novel Proactive AI-Based Agents Framework for an IoE-Based Smart Things Monitoring System with Applications for Smart Vehicles

    Meng-Hua Yen1,*, Nilamadhab Mishra2,*, Win-Jet Luo3, Chu-En Lin1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 1839-1855, 2025, DOI:10.32604/cmc.2025.060903 - 17 February 2025

    Abstract The Internet of Everything (IoE) coupled with Proactive Artificial Intelligence (AI)-Based Learning Agents (PLAs) through a cloud processing system is an idea that connects all computing resources to the Internet, making it possible for these devices to communicate with one another. Technologies featured in the IoE include embedding, networking, and sensing devices. To achieve the intended results of the IoE and ease life for everyone involved, sensing devices and monitoring systems are linked together. The IoE is used in several contexts, including intelligent cars’ protection, navigation, security, and fuel efficiency. The Smart Things Monitoring System… More >

  • Open Access

    ARTICLE

    MACLSTM: A Weather Attributes Enabled Recurrent Approach to Appliance-Level Energy Consumption Forecasting

    Ruoxin Li1,*, Shaoxiong Wu1, Fengping Deng1, Zhongli Tian1, Hua Cai1, Xiang Li1, Xu Xu1, Qi Liu2,3

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2969-2984, 2025, DOI:10.32604/cmc.2025.060230 - 17 February 2025

    Abstract Studies to enhance the management of electrical energy have gained considerable momentum in recent years. The question of how much energy will be needed in households is a pressing issue as it allows the management plan of the available resources at the power grids and consumer levels. A non-intrusive inference process can be adopted to predict the amount of energy required by appliances. In this study, an inference process of appliance consumption based on temporal and environmental factors used as a soft sensor is proposed. First, a study of the correlation between the electrical and… More >

  • Open Access

    ARTICLE

    Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security

    Reshma Siyal1, Muhammad Asim2,*, Long Jun1, Mohammed Elaffendi2, Sundas Iftikhar3, Rana Alnashwan4, Samia Allaoua Chelloug4,*

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2637-2664, 2025, DOI:10.32604/cmc.2025.058717 - 17 February 2025

    Abstract A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. More >

  • Open Access

    ARTICLE

    Innovative Approaches to Task Scheduling in Cloud Computing Environments Using an Advanced Willow Catkin Optimization Algorithm

    Jeng-Shyang Pan1,2, Na Yu1, Shu-Chuan Chu1,*, An-Ning Zhang1, Bin Yan3, Junzo Watada4

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2495-2520, 2025, DOI:10.32604/cmc.2024.058450 - 17 February 2025

    Abstract The widespread adoption of cloud computing has underscored the critical importance of efficient resource allocation and management, particularly in task scheduling, which involves assigning tasks to computing resources for optimized resource utilization. Several meta-heuristic algorithms have shown effectiveness in task scheduling, among which the relatively recent Willow Catkin Optimization (WCO) algorithm has demonstrated potential, albeit with apparent needs for enhanced global search capability and convergence speed. To address these limitations of WCO in cloud computing task scheduling, this paper introduces an improved version termed the Advanced Willow Catkin Optimization (AWCO) algorithm. AWCO enhances the algorithm’s… More >

  • Open Access

    ARTICLE

    Short-Term Photovoltaic Power Prediction Based on Multi-Stage Temporal Feature Learning

    Qiang Wang1, Hao Cheng2, Wenrui Zhang2,*, Guangxi Li3, Fan Xu2, Dianhao Chen4, Haixiang Zang4

    Energy Engineering, Vol.122, No.2, pp. 747-764, 2025, DOI:10.32604/ee.2025.059533 - 31 January 2025

    Abstract Harnessing solar power is essential for addressing the dual challenges of global warming and the depletion of traditional energy sources. However, the fluctuations and intermittency of photovoltaic (PV) power pose challenges for its extensive incorporation into power grids. Thus, enhancing the precision of PV power prediction is particularly important. Although existing studies have made progress in short-term prediction, issues persist, particularly in the underutilization of temporal features and the neglect of correlations between satellite cloud images and PV power data. These factors hinder improvements in PV power prediction performance. To overcome these challenges, this paper… More >

Displaying 61-70 on page 7 of 535. Per Page