Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (99)
  • Open Access

    ARTICLE

    Unmanned Aerial Vehicle Multi-Access Edge Computing as Security Enabler for Next-Gen 5G Security Frameworks

    Jaime Ortiz Córdoba, Alejandro Molina Zarca*, Antonio Skármeta

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2307-2333, 2023, DOI:10.32604/iasc.2023.039607

    Abstract 5G/Beyond 5G (B5G) networks provide connectivity to many heterogeneous devices, raising significant security and operational issues and making traditional infrastructure management increasingly complex. In this regard, new frameworks such as Anastacia-H2020 or INSPIRE-5GPlus automate the management of next-generation infrastructures, especially regarding policy-based security, abstraction, flexibility, and extensibility. This paper presents the design, workflow, and implementation of a security solution based on Unmanned Aerial Vehicles (UAVs), able to extend 5G/B5G security framework capabilities with UAV features like dynamic service provisioning in specific geographic areas. The proposed solution allows enforcing UAV security policies in proactive and reactive ways to automate UAV dynamic… More >

  • Open Access

    ARTICLE

    A Single Image Derain Method Based on Residue Channel Decomposition in Edge Computing

    Yong Cheng1, Zexuan Yang2,*, Wenjie Zhang3,4, Ling Yang5, Jun Wang1, Tingzhao Guan1

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1469-1482, 2023, DOI:10.32604/iasc.2023.038251

    Abstract The numerous photos captured by low-price Internet of Things (IoT) sensors are frequently affected by meteorological factors, especially rainfall. It causes varying sizes of white streaks on the image, destroying the image texture and ruining the performance of the outdoor computer vision system. Existing methods utilise training with pairs of images, which is difficult to cover all scenes and leads to domain gaps. In addition, the network structures adopt deep learning to map rain images to rain-free images, failing to use prior knowledge effectively. To solve these problems, we introduce a single image derain model in edge computing that combines… More >

  • Open Access

    ARTICLE

    Overbooking-Enabled Task Scheduling and Resource Allocation in Mobile Edge Computing Environments

    Jixun Gao1,2, Bingyi Hu2, Jialei Liu3,4,*, Huaichen Wang5, Quanzhen Huang1, Yuanyuan Zhao6

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1-16, 2023, DOI:10.32604/iasc.2023.036890

    Abstract Mobile Edge Computing (MEC) is proposed to solve the needs of Internet of Things (IoT) users for high resource utilization, high reliability and low latency of service requests. However, the backup virtual machine is idle when its primary virtual machine is running normally, which will waste resources. Overbooking the backup virtual machine under the above circumstances can effectively improve resource utilization. First, these virtual machines are deployed into slots randomly, and then some tasks with cooperative relationship are offloaded to virtual machines for processing. Different deployment locations have different resource utilization and average service response time. We want to find… More >

  • Open Access

    ARTICLE

    Improved Harris Hawks Optimization Algorithm Based Data Placement Strategy for Integrated Cloud and Edge Computing

    V. Nivethitha*, G. Aghila

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 887-904, 2023, DOI:10.32604/iasc.2023.034247

    Abstract Cloud computing is considered to facilitate a more cost-effective way to deploy scientific workflows. The individual tasks of a scientific workflow necessitate a diversified number of large states that are spatially located in different datacenters, thereby resulting in huge delays during data transmission. Edge computing minimizes the delays in data transmission and supports the fixed storage strategy for scientific workflow private datasets. Therefore, this fixed storage strategy creates huge amount of bottleneck in its storage capacity. At this juncture, integrating the merits of cloud computing and edge computing during the process of rationalizing the data placement of scientific workflows and… More >

  • Open Access

    ARTICLE

    Container-Based Internet of Vehicles Edge Application Migration Mechanism

    Sujie Shao, Shihan Tian*, Shaoyong Guo, Xuesong Qiu

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4867-4891, 2023, DOI:10.32604/cmc.2023.038280

    Abstract Internet of Vehicles (IoV) applications integrating with edge computing will significantly drive the growth of IoV. However, the contradiction between the high-speed mobility of vehicles, the delay sensitivity of corresponding IoV applications and the limited coverage and resource capacity of distributed edge servers will pose challenges to the service continuity and stability of IoV applications. IoV application migration is a promising solution that can be supported by application containerization, a technology forseamless cross-edge-server application migration without user perception. Therefore, this paper proposes the container-based IoV edge application migration mechanism, consisting of three parts. The first is the migration trigger determination… More >

  • Open Access

    ARTICLE

    MEC-IoT-Healthcare: Analysis and Prospects

    Hongyuan Wang1, Mohammed Dauwed2, Imran Khan3, Nor Samsiah Sani4,*, Hasmila Amirah Omar4, Hirofumi Amano5, Samih M. Mostafa6

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6219-6250, 2023, DOI:10.32604/cmc.2022.030958

    Abstract Physical sensors, intelligent sensors, and output recommendations are all examples of smart health technology that can be used to monitor patients’ health and change their behavior. Smart health is an Internet-of-Things (IoT)-aware network and sensing infrastructure that provides real-time, intelligent, and ubiquitous healthcare services. Because of the rapid development of cloud computing, as well as related technologies such as fog computing, smart health research is progressively moving in the right direction. Cloud, fog computing, IoT sensors, blockchain, privacy and security, and other related technologies have been the focus of smart health research in recent years. At the moment, the focus… More >

  • Open Access

    ARTICLE

    Vertical Federated Learning Based on Consortium Blockchain for Data Sharing in Mobile Edge Computing

    Yonghao Zhang1,3, Yongtang Wu2, Tao Li1, Hui Zhou1,3, Yuling Chen1,2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 345-361, 2023, DOI:10.32604/cmes.2023.026920

    Abstract The data in Mobile Edge Computing (MEC) contains tremendous market value, and data sharing can maximize the usefulness of the data. However, certain data is quite sensitive, and sharing it directly may violate privacy. Vertical Federated Learning (VFL) is a secure distributed machine learning framework that completes joint model training by passing encrypted model parameters rather than raw data, so there is no data privacy leakage during the training process. Therefore, the VFL can build a bridge between data demander and owner to realize data sharing while protecting data privacy. Typically, the VFL requires a third party for key distribution… More >

  • Open Access

    ARTICLE

    Efficient Authentication Scheme for UAV-Assisted Mobile Edge Computing

    Maryam Alhassan, Abdul Raouf Khan*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 2727-2740, 2023, DOI:10.32604/cmc.2023.037129

    Abstract Preserving privacy is imperative in the new unmanned aerial vehicle (UAV)-assisted mobile edge computing (MEC) architecture to ensure that sensitive information is protected and kept secure throughout the communication. Simultaneously, efficiency must be considered while developing such a privacy-preserving scheme because the devices involved in these architectures are resource constrained. This study proposes a lightweight and efficient authentication scheme for the UAV-assisted MEC environment. The proposed scheme is a hardware-based password-less authentication mechanism that is based on the fact that temporal and memory-related efficiency can be significantly improved while maintaining the data security by adopting a hardware-based solution with a… More >

  • Open Access

    ARTICLE

    A Time Pattern-Based Intelligent Cache Optimization Policy on Korea Advanced Research Network

    Waleed Akbar, Afaq Muhammad, Wang-Cheol Song*

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3743-3759, 2023, DOI:10.32604/iasc.2023.036440

    Abstract Data is growing quickly due to a significant increase in social media applications. Today, billions of people use an enormous amount of data to access the Internet. The backbone network experiences a substantial load as a result of an increase in users. Users in the same region or company frequently ask for similar material, especially on social media platforms. The subsequent request for the same content can be satisfied from the edge if stored in proximity to the user. Applications that require relatively low latency can use Content Delivery Network (CDN) technology to meet their requirements. An edge and the… More >

  • Open Access

    ARTICLE

    Portable and Efficient Implementation of CRYSTALS-Kyber Based on WebAssembly

    Seog Chung Seo1, HeeSeok Kim2,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2091-2107, 2023, DOI:10.32604/csse.2023.035064

    Abstract With the rapid development of quantum computers capable of realizing Shor’s algorithm, existing public key-based algorithms face a significant security risk. Crystals-Kyber has been selected as the only key encapsulation mechanism (KEM) algorithm in the National Institute of Standards and Technology (NIST) Post-Quantum Cryptography (PQC) competition. In this study, we present a portable and efficient implementation of a Crystals-Kyber post-quantum KEM based on WebAssembly (Wasm), a recently released portable execution framework for high-performance web applications. Until now, most Kyber implementations have been developed with native programming languages such as C and Assembly. Although there are a few previous Kyber implementations… More >

Displaying 21-30 on page 3 of 99. Per Page