Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (217)
  • Open Access

    ARTICLE

    Performance Evaluation of Virtualization Methodologies to Facilitate NFV Deployment

    Sumbal Zahoor1, Ishtiaq Ahmad1, Ateeq Ur Rehman2, Elsayed Tag Eldin3, Nivin A. Ghamry4, Muhammad Shafiq5,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 311-329, 2023, DOI:10.32604/cmc.2023.035960

    Abstract The development of the Next-Generation Wireless Network (NGWN) is becoming a reality. To conduct specialized processes more, rapid network deployment has become essential. Methodologies like Network Function Virtualization (NFV), Software-Defined Networks (SDN), and cloud computing will be crucial in addressing various challenges that 5G networks will face, particularly adaptability, scalability, and reliability. The motivation behind this work is to confirm the function of virtualization and the capabilities offered by various virtualization platforms, including hypervisors, clouds, and containers, which will serve as a guide to dealing with the stimulating environment of 5G. This is particularly crucial when implementing network operations at… More >

  • Open Access

    ARTICLE

    Multi-Layer Fog-Cloud Architecture for Optimizing the Placement of IoT Applications in Smart Cities

    Mohammad Aldossary*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 633-649, 2023, DOI:10.32604/cmc.2023.035414

    Abstract In the smart city paradigm, the deployment of Internet of Things (IoT) services and solutions requires extensive communication and computing resources to place and process IoT applications in real time, which consumes a lot of energy and increases operational costs. Usually, IoT applications are placed in the cloud to provide high-quality services and scalable resources. However, the existing cloud-based approach should consider the above constraints to efficiently place and process IoT applications. In this paper, an efficient optimization approach for placing IoT applications in a multi-layer fog-cloud environment is proposed using a mathematical model (Mixed-Integer Linear Programming (MILP)). This approach… More >

  • Open Access

    ARTICLE

    Construction and Application of Cloud Computing Model for Reciprocal and Collaborative Knowledge Management

    Jingqi Li1,*, Yijie Bian1, Jun Guan2, Lu Yang2

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1119-1137, 2023, DOI:10.32604/cmc.2023.035369

    Abstract Promoting the co-constructing and sharing of organizational knowledge and improving organizational performance have always been the core research subject of knowledge management. Existing research focuses on the construction of knowledge management systems and knowledge sharing and transfer mechanisms. With the rapid development and application of cloud computing and big data technology, knowledge management is faced with many problems, such as how to combine with the new generation of information technology, how to achieve integration with organizational business processes, and so on. To solve such problems, this paper proposes a reciprocal collaborative knowledge management model (RCKM model) based on cloud computing… More >

  • Open Access

    ARTICLE

    Edge-Cloud Computing for Scheduling the Energy Consumption in Smart Grid

    Abdulaziz Alorf*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 273-286, 2023, DOI:10.32604/csse.2023.035437

    Abstract Nowadays, smart electricity grids are managed through advanced tools and techniques. The advent of Artificial Intelligence (AI) and network technology helps to control the energy demand. These advanced technologies can resolve common issues such as blackouts, optimal energy generation costs, and peak-hours congestion. In this paper, the residential energy demand has been investigated and optimized to enhance the Quality of Service (QoS) to consumers. The energy consumption is distributed throughout the day to fulfill the demand in peak hours. Therefore, an Edge-Cloud computing-based model is proposed to schedule the energy demand with reward-based energy consumption. This model gives priority to… More >

  • Open Access

    ARTICLE

    Intelligent Digital Envelope for Distributed Cloud-Based Big Data Security

    S. Prince Chelladurai1,*, T. Rajagopalan2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 951-960, 2023, DOI:10.32604/csse.2023.034262

    Abstract Cloud computing offers numerous web-based services. The adoption of many Cloud applications has been hindered by concerns about data security and privacy. Cloud service providers’ access to private information raises more security issues. In addition, Cloud computing is incompatible with several industries, including finance and government. Public-key cryptography is frequently cited as a significant advancement in cryptography. In contrast, the Digital Envelope that will be used combines symmetric and asymmetric methods to secure sensitive data. This study aims to design a Digital Envelope for distributed Cloud-based large data security using public-key cryptography. Through strategic design, the hybrid Envelope model adequately… More >

  • Open Access

    ARTICLE

    Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment

    P. Prathap Nayudu, Krovi Raja Sekhar*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1079-1092, 2023, DOI:10.32604/csse.2023.033961

    Abstract The cloud allows clients to store and share data. Depending on the user’s needs, it is imperative to design an effective access control plan to share the information only with approved users. The user loses control of their data when the data is outsourced to the cloud. Therefore, access control mechanisms will become a significant challenging problem. The Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is an essential solution in which the user can control data access. CP-ABE encrypts the data under a limited access policy after the user sets some access policies. The user can decrypt the data if they satisfy the… More >

  • Open Access

    ARTICLE

    Latency Minimization Using an Adaptive Load Balancing Technique in Microservices Applications

    G. Selvakumar1,*, L. S. Jayashree2, S. Arumugam3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1215-1231, 2023, DOI:10.32604/csse.2023.032509

    Abstract Advancements in cloud computing and virtualization technologies have revolutionized Enterprise Application Development with innovative ways to design and develop complex systems. Microservices Architecture is one of the recent techniques in which Enterprise Systems can be developed as fine-grained smaller components and deployed independently. This methodology brings numerous benefits like scalability, resilience, flexibility in development, faster time to market, etc. and the advantages; Microservices bring some challenges too. Multiple microservices need to be invoked one by one as a chain. In most applications, more than one chain of microservices runs in parallel to complete a particular requirement To complete a user’s… More >

  • Open Access

    ARTICLE

    Hash-Indexing Block-Based Deduplication Algorithm for Reducing Storage in the Cloud

    D. Viji*, S. Revathy

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 27-42, 2023, DOI:10.32604/csse.2023.030259

    Abstract Cloud storage is essential for managing user data to store and retrieve from the distributed data centre. The storage service is distributed as pay a service for accessing the size to collect the data. Due to the massive amount of data stored in the data centre containing similar information and file structures remaining in multi-copy, duplication leads to increase storage space. The potential deduplication system doesn’t make efficient data reduction because of inaccuracy in finding similar data analysis. It creates a complex nature to increase the storage consumption under cost. To resolve this problem, this paper proposes an efficient storage… More >

  • Open Access

    ARTICLE

    A Broker-Based Task-Scheduling Mechanism Using Replication Approach for Cloud Systems

    Abdulelah Alwabel*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2217-2232, 2023, DOI:10.32604/iasc.2023.033703

    Abstract The reliability and availability of cloud systems have become major concerns of service providers, brokers, and end-users. Therefore, studying fault-tolerance mechanisms in cloud computing attracts intense attention in industry and academia. The task-scheduling mechanisms can improve the fault-tolerance level of cloud systems. A task-scheduling mechanism distributes tasks to a group of instances to be executed. Much work has been undertaken in this direction to improve the overall outcome of cloud computing, such as improving service quality and reducing power consumption. However, little work on task scheduling has studied the problem of lost tasks from the broker’s perspective. Task loss can… More >

  • Open Access

    ARTICLE

    Blockchain and Data Integrity Authentication Technique for Secure Cloud Environment

    A. Ramachandran1,*, P. Ramadevi2, Ahmed Alkhayyat3, Yousif Kerrar Yousif4

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2055-2070, 2023, DOI:10.32604/iasc.2023.032942

    Abstract Nowadays, numerous applications are associated with cloud and user data gets collected globally and stored in cloud units. In addition to shared data storage, cloud computing technique offers multiple advantages for the user through different distribution designs like hybrid cloud, public cloud, community cloud and private cloud. Though cloud-based computing solutions are highly convenient to the users, it also brings a challenge i.e., security of the data shared. Hence, in current research paper, blockchain with data integrity authentication technique is developed for an efficient and secure operation with user authentication process. Blockchain technology is utilized in this study to enable… More >

Displaying 31-40 on page 4 of 217. Per Page