Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (85)
  • Open Access

    ARTICLE

    Container-Based Internet of Vehicles Edge Application Migration Mechanism

    Sujie Shao, Shihan Tian*, Shaoyong Guo, Xuesong Qiu

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4867-4891, 2023, DOI:10.32604/cmc.2023.038280

    Abstract Internet of Vehicles (IoV) applications integrating with edge computing will significantly drive the growth of IoV. However, the contradiction between the high-speed mobility of vehicles, the delay sensitivity of corresponding IoV applications and the limited coverage and resource capacity of distributed edge servers will pose challenges to the service continuity and stability of IoV applications. IoV application migration is a promising solution that can be supported by application containerization, a technology forseamless cross-edge-server application migration without user perception. Therefore, this paper proposes the container-based IoV edge application migration mechanism, consisting of three parts. The first is the migration trigger determination… More >

  • Open Access

    ARTICLE

    MEC-IoT-Healthcare: Analysis and Prospects

    Hongyuan Wang1, Mohammed Dauwed2, Imran Khan3, Nor Samsiah Sani4,*, Hasmila Amirah Omar4, Hirofumi Amano5, Samih M. Mostafa6

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6219-6250, 2023, DOI:10.32604/cmc.2022.030958

    Abstract Physical sensors, intelligent sensors, and output recommendations are all examples of smart health technology that can be used to monitor patients’ health and change their behavior. Smart health is an Internet-of-Things (IoT)-aware network and sensing infrastructure that provides real-time, intelligent, and ubiquitous healthcare services. Because of the rapid development of cloud computing, as well as related technologies such as fog computing, smart health research is progressively moving in the right direction. Cloud, fog computing, IoT sensors, blockchain, privacy and security, and other related technologies have been the focus of smart health research in recent years. At the moment, the focus… More >

  • Open Access

    ARTICLE

    Vertical Federated Learning Based on Consortium Blockchain for Data Sharing in Mobile Edge Computing

    Yonghao Zhang1,3, Yongtang Wu2, Tao Li1, Hui Zhou1,3, Yuling Chen1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 345-361, 2023, DOI:10.32604/cmes.2023.026920

    Abstract The data in Mobile Edge Computing (MEC) contains tremendous market value, and data sharing can maximize the usefulness of the data. However, certain data is quite sensitive, and sharing it directly may violate privacy. Vertical Federated Learning (VFL) is a secure distributed machine learning framework that completes joint model training by passing encrypted model parameters rather than raw data, so there is no data privacy leakage during the training process. Therefore, the VFL can build a bridge between data demander and owner to realize data sharing while protecting data privacy. Typically, the VFL requires a third party for key distribution… More >

  • Open Access

    ARTICLE

    Efficient Authentication Scheme for UAV-Assisted Mobile Edge Computing

    Maryam Alhassan, Abdul Raouf Khan*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2727-2740, 2023, DOI:10.32604/cmc.2023.037129

    Abstract Preserving privacy is imperative in the new unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) architecture to ensure that sensitive information is protected and kept secure throughout the communication. Simultaneously, efficiency must be considered while developing such a privacy-preserving scheme because the devices involved in these architectures are resource constrained. This study proposes a lightweight and efficient authentication scheme for the UAV-assisted MEC environment. The proposed scheme is a hardware-based password-less authentication mechanism that is based on the fact that temporal and memory-related efficiency can be significantly improved while maintaining the data security by adopting a hardware-based solution with a… More >

  • Open Access

    ARTICLE

    A Time Pattern-Based Intelligent Cache Optimization Policy on Korea Advanced Research Network

    Waleed Akbar, Afaq Muhammad, Wang-Cheol Song*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3743-3759, 2023, DOI:10.32604/iasc.2023.036440

    Abstract Data is growing quickly due to a significant increase in social media applications. Today, billions of people use an enormous amount of data to access the Internet. The backbone network experiences a substantial load as a result of an increase in users. Users in the same region or company frequently ask for similar material, especially on social media platforms. The subsequent request for the same content can be satisfied from the edge if stored in proximity to the user. Applications that require relatively low latency can use Content Delivery Network (CDN) technology to meet their requirements. An edge and the… More >

  • Open Access

    ARTICLE

    Portable and Efficient Implementation of CRYSTALS-Kyber Based on WebAssembly

    Seog Chung Seo1, HeeSeok Kim2,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2091-2107, 2023, DOI:10.32604/csse.2023.035064

    Abstract With the rapid development of quantum computers capable of realizing Shor’s algorithm, existing public key-based algorithms face a significant security risk. Crystals-Kyber has been selected as the only key encapsulation mechanism (KEM) algorithm in the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) competition. In this study, we present a portable and efficient implementation of a Crystals-Kyber post-quantum KEM based on WebAssembly (Wasm), a recently released portable execution framework for high-performance web applications. Until now, most Kyber implementations have been developed with native programming languages such as C and Assembly. Although there are a few previous Kyber implementations… More >

  • Open Access

    ARTICLE

    An Edge Computing Algorithm Based on Multi-Level Star Sensor Cloud

    Siyu Ren1, Shi Qiu2,*, Keyang Cheng3

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 1643-1659, 2023, DOI:10.32604/cmes.2023.025248

    Abstract Star sensors are an important means of autonomous navigation and access to space information for satellites. They have been widely deployed in the aerospace field. To satisfy the requirements for high resolution, timeliness, and confidentiality of star images, we propose an edge computing algorithm based on the star sensor cloud. Multiple sensors cooperate with each other to form a sensor cloud, which in turn extends the performance of a single sensor. The research on the data obtained by the star sensor has very important research and application values. First, a star point extraction model is proposed based on the fuzzy… More >

  • Open Access

    ARTICLE

    RankXGB-Based Enterprise Credit Scoring by Electricity Consumption in Edge Computing Environment

    Qiuying Shen1, Wentao Zhang1, Mofei Song2,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 197-217, 2023, DOI:10.32604/cmc.2023.036365

    Abstract With the rapid development of the internet of things (IoT), electricity consumption data can be captured and recorded in the IoT cloud center. This provides a credible data source for enterprise credit scoring, which is one of the most vital elements during the financial decision-making process. Accordingly, this paper proposes to use deep learning to train an enterprise credit scoring model by inputting the electricity consumption data. Instead of predicting the credit rating, our method can generate an absolute credit score by a novel deep ranking model–ranking extreme gradient boosting net (rankXGB). To boost the performance, the rankXGB model combines… More >

  • Open Access

    ARTICLE

    Edge Computing Task Scheduling with Joint Blockchain and Task Caching in Industrial Internet

    Yanping Chen1,2,3, Xuyang Bai1,2,3,*, Xiaomin Jin1,2,3, Zhongmin Wang1,2,3, Fengwei Wang4, Li Ling4

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 2101-2117, 2023, DOI:10.32604/cmc.2023.035530

    Abstract Deploying task caching at edge servers has become an effective way to handle compute-intensive and latency-sensitive tasks on the industrial internet. However, how to select the task scheduling location to reduce task delay and cost while ensuring the data security and reliable communication of edge computing remains a challenge. To solve this problem, this paper establishes a task scheduling model with joint blockchain and task caching in the industrial internet and designs a novel blockchain-assisted caching mechanism to enhance system security. In this paper, the task scheduling problem, which couples the task scheduling decision, task caching decision, and blockchain reward,… More >

  • Open Access

    ARTICLE

    Connected Vehicles Computation Task Offloading Based on Opportunism in Cooperative Edge Computing

    Duan Xue1,2, Yan Guo1,*, Ning Li1, Xiaoxiang Song1

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 609-631, 2023, DOI:10.32604/cmc.2023.035177

    Abstract The traditional multi-access edge computing (MEC) capacity is overwhelmed by the increasing demand for vehicles, leading to acute degradation in task offloading performance. There is a tremendous number of resource-rich and idle mobile connected vehicles (CVs) in the traffic network, and vehicles are created as opportunistic ad-hoc edge clouds to alleviate the resource limitation of MEC by providing opportunistic computing services. On this basis, a novel scalable system framework is proposed in this paper for computation task offloading in opportunistic CV-assisted MEC. In this framework, opportunistic ad-hoc edge cloud and fixed edge cloud cooperate to form a novel hybrid cloud.… More >

Displaying 11-20 on page 2 of 85. Per Page