Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (220)
  • Open Access

    ARTICLE

    Artificial Bee Colony with Cuckoo Search for Solving Service Composition

    Fadl Dahan1,2,*, Abdulelah Alwabel3

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3385-3402, 2023, DOI:10.32604/iasc.2023.030651

    Abstract In recent years, cloud computing has provided a Software As A Service (SaaS) platform where the software can be reused and applied to fulfill complicated user demands according to specific Quality of Services (QoS) constraints. The user requirements are formulated as a workflow consisting of a set of tasks. However, many services may satisfy the functionality of each task; thus, searching for the composition of the optimal service while maximizing the QoS is formulated as an NP-hard problem. This work will introduce a hybrid Artificial Bee Colony (ABC) with a Cuckoo Search (CS) algorithm to untangle service composition problem. The… More >

  • Open Access

    ARTICLE

    Oppositional Red Fox Optimization Based Task Scheduling Scheme for Cloud Environment

    B. Chellapraba1,*, D. Manohari2, K. Periyakaruppan3, M. S. Kavitha4

    Computer Systems Science and Engineering, Vol.45, No.1, pp. 483-495, 2023, DOI:10.32604/csse.2023.029854

    Abstract Owing to massive technological developments in Internet of Things (IoT) and cloud environment, cloud computing (CC) offers a highly flexible heterogeneous resource pool over the network, and clients could exploit various resources on demand. Since IoT-enabled models are restricted to resources and require crisp response, minimum latency, and maximum bandwidth, which are outside the capabilities. CC was handled as a resource-rich solution to aforementioned challenge. As high delay reduces the performance of the IoT enabled cloud platform, efficient utilization of task scheduling (TS) reduces the energy usage of the cloud infrastructure and increases the income of service provider via minimizing… More >

  • Open Access

    ARTICLE

    Towards Developing Privacy-Preserved Data Security Approach (PP-DSA) in Cloud Computing Environment

    S. Stewart Kirubakaran1,*, V. P. Arunachalam1, S. Karthik1, S. Kannan2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1881-1895, 2023, DOI:10.32604/csse.2023.026690

    Abstract In the present scenario of rapid growth in cloud computing models, several companies and users started to share their data on cloud servers. However, when the model is not completely trusted, the data owners face several security-related problems, such as user privacy breaches, data disclosure, data corruption, and so on, during the process of data outsourcing. For addressing and handling the security-related issues on Cloud, several models were proposed. With that concern, this paper develops a Privacy-Preserved Data Security Approach (PP-DSA) to provide the data security and data integrity for the outsourcing data in Cloud Environment. Privacy preservation is ensured… More >

  • Open Access

    ARTICLE

    Discrete GWO Optimized Data Aggregation for Reducing Transmission Rate in IoT

    S. Siamala Devi1, K. Venkatachalam2, Yunyoung Nam3,*, Mohamed Abouhawwash4,5

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1869-1880, 2023, DOI:10.32604/csse.2023.025505

    Abstract The conventional hospital environment is transformed into digital transformation that focuses on patient centric remote approach through advanced technologies. Early diagnosis of many diseases will improve the patient life. The cost of health care systems is reduced due to the use of advanced technologies such as Internet of Things (IoT), Wireless Sensor Networks (WSN), Embedded systems, Deep learning approaches and Optimization and aggregation methods. The data generated through these technologies will demand the bandwidth, data rate, latency of the network. In this proposed work, efficient discrete grey wolf optimization (DGWO) based data aggregation scheme using Elliptic curve Elgamal with Message… More >

  • Open Access

    ARTICLE

    An Adaptive Genetic Algorithm-Based Load Balancing-Aware Task Scheduling Technique for Cloud Computing

    Mohit Agarwal1,*, Shikha Gupta2

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 6103-6119, 2022, DOI:10.32604/cmc.2022.030778

    Abstract Task scheduling in highly elastic and dynamic processing environments such as cloud computing have become the most discussed problem among researchers. Task scheduling algorithms are responsible for the allocation of the tasks among the computing resources for their execution, and an inefficient task scheduling algorithm results in under-or over-utilization of the resources, which in turn leads to degradation of the services. Therefore, in the proposed work, load balancing is considered as an important criterion for task scheduling in a cloud computing environment as it can help in reducing the overhead in the critical decision-oriented process. In this paper, we propose… More >

  • Open Access

    ARTICLE

    A New Reliable System For Managing Virtual Cloud Network

    Samah Alshathri1,*, Fatma M. Talaat2, Aida A. Nasr3

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5863-5885, 2022, DOI:10.32604/cmc.2022.026547

    Abstract Virtual cloud network (VCN) usage is popular today among large and small organizations due to its safety and money-saving. Moreover, it makes all resources in the company work as one unit. VCN also facilitates sharing of files and applications without effort. However, cloud providers face many issues in managing the VCN on cloud computing including these issues: Power consumption, network failures, and data availability. These issues often occur due to overloaded and unbalanced load tasks. In this paper, we propose a new automatic system to manage VCN for executing the workflow. The new system called Multi-User Hybrid Scheduling (MUSH) can… More >

  • Open Access

    ARTICLE

    Gorilla Troops Optimizer Based Fault Tolerant Aware Scheduling Scheme for Cloud Environment

    R. Rengaraj alias Muralidharan1,*, K. Latha2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1923-1937, 2023, DOI:10.32604/iasc.2023.029495

    Abstract In cloud computing (CC), resources are allocated and offered to the clients transparently in an on-demand way. Failures can happen in CC environment and the cloud resources are adaptable to fluctuations in the performance delivery. Task execution failure becomes common in the CC environment. Therefore, fault-tolerant scheduling techniques in CC environment are essential for handling performance differences, resource fluxes, and failures. Recently, several intelligent scheduling approaches have been developed for scheduling tasks in CC with no consideration of fault tolerant characteristics. With this motivation, this study focuses on the design of Gorilla Troops Optimizer Based Fault Tolerant Aware Scheduling Scheme… More >

  • Open Access

    ARTICLE

    Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing

    Abdul Saboor1,*, Mohd Fadzil Hassan2, Rehan Akbar1, Erwin Susanto3, Syed Nasir Mehmood Shah4, Muhammad Aadil Siddiqui5, Saeed Ahmed Magsi5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2223-2239, 2022, DOI:10.32604/cmc.2022.028382

    Abstract Cloud computing has gained significant use over the last decade due to its several benefits, including cost savings associated with setup, deployments, delivery, physical resource sharing across virtual machines, and availability of on-demand cloud services. However, in addition to usual threats in almost every computing environment, cloud computing has also introduced a set of new threats as consumers share physical resources due to the physical co-location paradigm. Furthermore, since there are a growing number of attacks directed at cloud environments (including dictionary attacks, replay code attacks, denial of service attacks, rootkit attacks, code injection attacks, etc.), customers require additional assurances… More >

  • Open Access

    ARTICLE

    Chaotic Sandpiper Optimization Based Virtual Machine Scheduling for Cyber-Physical Systems

    P. Ramadevi1,*, T. Jayasankar1, V. Dinesh2, M. Dhamodaran3

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1373-1385, 2023, DOI:10.32604/csse.2023.026603

    Abstract Recently, with the growth of cyber physical systems (CPS), several applications have begun to deploy in the CPS for connecting the cyber space with the physical scale effectively. Besides, the cloud computing (CC) enabled CPS offers huge processing and storage resources for CPS that finds helpful for a range of application areas. At the same time, with the massive development of applications that exist in the CPS environment, the energy utilization of the cloud enabled CPS has gained significant interest. For improving the energy effectiveness of the CC platform, virtualization technologies have been employed for resource management and the applications… More >

  • Open Access

    ARTICLE

    Iterative Dichotomiser Posteriori Method Based Service Attack Detection in Cloud Computing

    B. Dhiyanesh1,*, K. Karthick2, R. Radha3, Anita Venaik4

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1099-1107, 2023, DOI:10.32604/csse.2023.024691

    Abstract Cloud computing (CC) is an advanced technology that provides access to predictive resources and data sharing. The cloud environment represents the right type regarding cloud usage model ownership, size, and rights to access. It introduces the scope and nature of cloud computing. In recent times, all processes are fed into the system for which consumer data and cache size are required. One of the most security issues in the cloud environment is Distributed Denial of Service (DDoS) attacks, responsible for cloud server overloading. This proposed system ID3 (Iterative Dichotomiser 3) Maximum Multifactor Dimensionality Posteriori Method (ID3-MMDP) is used to overcome… More >

Displaying 71-80 on page 8 of 220. Per Page