Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access


    Performance Evaluation of Virtualization Methodologies to Facilitate NFV Deployment

    Sumbal Zahoor1, Ishtiaq Ahmad1, Ateeq Ur Rehman2, Elsayed Tag Eldin3, Nivin A. Ghamry4, Muhammad Shafiq5,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 311-329, 2023, DOI:10.32604/cmc.2023.035960

    Abstract The development of the Next-Generation Wireless Network (NGWN) is becoming a reality. To conduct specialized processes more, rapid network deployment has become essential. Methodologies like Network Function Virtualization (NFV), Software-Defined Networks (SDN), and cloud computing will be crucial in addressing various challenges that 5G networks will face, particularly adaptability, scalability, and reliability. The motivation behind this work is to confirm the function of virtualization and the capabilities offered by various virtualization platforms, including hypervisors, clouds, and containers, which will serve as a guide to dealing with the stimulating environment of 5G. This is particularly crucial when implementing network operations at… More >

  • Open Access


    Cyber Secure Framework for Smart Containers Based on Novel Hybrid DTLS Protocol

    Waseem Ullah Khan*, Safdar Nawaz Khan Marwat, Salman Ahmed

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1297-1313, 2022, DOI:10.32604/csse.2022.024018

    Abstract The Internet of Things (IoTs) is apace growing, billions of IoT devices are connected to the Internet which communicate and exchange data among each other. Applications of IoT can be found in many fields of engineering and sciences such as healthcare, traffic, agriculture, oil and gas industries, and logistics. In logistics, the products which are to be transported may be sensitive and perishable, and require controlled environment. Most of the commercially available logistic containers are not integrated with IoT devices to provide controlled environment parameters inside the container and to transmit data to a remote server. This necessitates the need… More >

  • Open Access


    Container Introspection: Using External Management Containers to Monitor Containers in Cloud Computing

    Dongyang Zhan1,*, Kai Tan1, Lin Ye1,2, Haining Yu1,3, Hao Liu4

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3783-3794, 2021, DOI:10.32604/cmc.2021.019432

    Abstract Cloud computing plays an important role in today's Internet environment, which meets the requirements of scalability, security and reliability by using virtualization technologies. Container technology is one of the two mainstream virtualization solutions. Its lightweight, high deployment efficiency make container technology widely used in large-scale cloud computing. While container technology has created huge benefits for cloud service providers and tenants, it cannot meet the requirements of security monitoring and management from a tenant perspective. Currently, tenants can only run their security monitors in the target container, but it is not secure because the attacker is able to detect and compromise… More >

  • Open Access


    On the Nature and Structure of Possible Three-dimensional Steady Flows in Closed and Open Parallelepipedic and Cubical Containers under Different Heating Conditions and Driving Forces.

    Marcello Lappa1, 2

    FDMP-Fluid Dynamics & Materials Processing, Vol.1, No.1, pp. 1-20, 2005, DOI:10.3970/fdmp.2005.001.001

    Abstract Possible natural transport mechanisms in cubical and shallow cavities with different heating conditions (from below or from the side) are investigated by means of numerical solution of the non-linear model equations and multiprocessor computations. Attention is focused on a variety of three-dimensional steady effects that can arise in such configurations in the case of low-Pr liquids (silicon melt) even for relatively small values of the temperature gradient due to localized boundary effects and/or true instabilities of the flow. Such aspects are still poorly known or completely ignored owing to the fact that most of the existing experiments focused on the… More >

  • Open Access


    Computer Simulation of Random Sphere Packing in an Arbitrarily Shaped Container

    S.X. Li1, L. Zhao1, Y.W. Liu2

    CMC-Computers, Materials & Continua, Vol.7, No.2, pp. 109-118, 2008, DOI:10.3970/cmc.2008.007.109

    Abstract Most simulations of random sphere packing concern a cubic or cylindric container with periodic boundary, containers of other shapes are rarely studied. In this paper, a new relaxation algorithm with pre-expanding procedure for random sphere packing in an arbitrarily shaped container is presented. Boundaries of the container are simulated by overlapping spheres which covers the boundary surface of the container. We find 0.4~0.6 of the overlap rate is a proper value for boundary spheres. The algorithm begins with a random distribution of small internal spheres. Then the expansion and relaxation procedures are performed alternately to increase the packing density. The… More >

Displaying 1-10 on page 1 of 5. Per Page