Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (99)
  • Open Access

    ARTICLE

    Efficient UAV-Based MEC Using GPU-Based PSO and Voronoi Diagrams

    Mohamed H. Mousa1,2,*, Mohamed K. Hussein2

    CMES-Computer Modeling in Engineering & Sciences, Vol.133, No.2, pp. 413-434, 2022, DOI:10.32604/cmes.2022.020639

    Abstract Mobile-Edge Computing (MEC) displaces cloud services as closely as possible to the end user. This enables the edge servers to execute the offloaded tasks that are requested by the users, which in turn decreases the energy consumption and the turnaround time delay. However, as a result of a hostile environment or in catastrophic zones with no network, it could be difficult to deploy such edge servers. Unmanned Aerial Vehicles (UAVs) can be employed in such scenarios. The edge servers mounted on these UAVs assist with task offloading. For the majority of IoT applications, the execution times of tasks are often… More >

  • Open Access

    ARTICLE

    Intelligent Resource Allocations for Software-Defined Mission-Critical IoT Services

    Chaebeen Nam1, Sa Math1, Prohim Tam1, Seokhoon Kim1,2,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4087-4102, 2022, DOI:10.32604/cmc.2022.030575

    Abstract Heterogeneous Internet of Things (IoT) applications generate a diversity of novelty applications and services in next-generation networks (NGN), which is essential to guarantee end-to-end (E2E) communication resources for both control plane (CP) and data plane (DP). Likewise, the heterogeneous 5th generation (5G) communication applications, including Mobile Broadband Communications (MBBC), massive Machine-Type Commutation (mMTC), and ultra-reliable low latency communications (URLLC), obligate to perform intelligent Quality-of-Service (QoS) Class Identifier (QCI), while the CP entities will be suffered from the complicated massive HIOT applications. Moreover, the existing management and orchestration (MANO) models are inappropriate for resource utilization and allocation in large-scale and complicated… More >

  • Open Access

    ARTICLE

    Efficient Computation Offloading of IoT-Based Workflows Using Discrete Teaching Learning-Based Optimization

    Mohamed K. Hussein1,*, Mohamed H. Mousa1,2

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3685-3703, 2022, DOI:10.32604/cmc.2022.026370

    Abstract As the Internet of Things (IoT) and mobile devices have rapidly proliferated, their computationally intensive applications have developed into complex, concurrent IoT-based workflows involving multiple interdependent tasks. By exploiting its low latency and high bandwidth, mobile edge computing (MEC) has emerged to achieve the high-performance computation offloading of these applications to satisfy the quality-of-service requirements of workflows and devices. In this study, we propose an offloading strategy for IoT-based workflows in a high-performance MEC environment. The proposed task-based offloading strategy consists of an optimization problem that includes task dependency, communication costs, workflow constraints, device energy consumption, and the heterogeneous characteristics… More >

  • Open Access

    ARTICLE

    Optimal and Effective Resource Management in Edge Computing

    Darpan Majumder1,*, S. Mohan Kumar2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1201-1217, 2023, DOI:10.32604/csse.2023.024868

    Abstract Edge computing is a cloud computing extension where physical computers are installed closer to the device to minimize latency. The task of edge data centers is to include a growing abundance of applications with a small capability in comparison to conventional data centers. Under this framework, Federated Learning was suggested to offer distributed data training strategies by the coordination of many mobile devices for the training of a popular Artificial Intelligence (AI) model without actually revealing the underlying data, which is significantly enhanced in terms of privacy. Federated learning (FL) is a recently developed decentralized profound learning methodology, where customers… More >

  • Open Access

    ARTICLE

    Multi-Classification and Distributed Reinforcement Learning-Based Inspection Swarm Offloading Strategy

    Yuping Deng1, Tao Wu1, Xi Chen2,*, Amir Homayoon Ashrafzadeh3

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 1157-1174, 2022, DOI:10.32604/iasc.2022.022606

    Abstract In meteorological and electric power Internet of Things scenarios, in order to extend the service life of relevant facilities and reduce the cost of emergency repair, the intelligent inspection swarm is introduced to cooperate with monitoring tasks, which collect and process the current scene data through a variety of sensors and cameras, and complete tasks such as emergency handling and fault inspection. Due to the limitation of computing resources and battery life of patrol inspection equipment, it will cause problems such as slow response in emergency and long time for fault location. Mobile Edge Computing is a promising technology, which… More >

  • Open Access

    ARTICLE

    Soft Computing Based Metaheuristic Algorithms for Resource Management in Edge Computing Environment

    Nawaf Alhebaishi1, Abdulrhman M. Alshareef1, Tawfiq Hasanin1, Raed Alsini1, Gyanendra Prasad Joshi2, Seongsoo Cho3, Doo Ill Chul4,*

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5233-5250, 2022, DOI:10.32604/cmc.2022.025596

    Abstract In recent times, internet of things (IoT) applications on the cloud might not be the effective solution for every IoT scenario, particularly for time sensitive applications. A significant alternative to use is edge computing that resolves the problem of requiring high bandwidth by end devices. Edge computing is considered a method of forwarding the processing and communication resources in the cloud towards the edge. One of the considerations of the edge computing environment is resource management that involves resource scheduling, load balancing, task scheduling, and quality of service (QoS) to accomplish improved performance. With this motivation, this paper presents new… More >

  • Open Access

    ARTICLE

    Artificial Intelligence Based Data Offloading Technique for Secure MEC Systems

    Fadwa Alrowais1, Ahmed S. Almasoud2, Radwa Marzouk3, Fahd N. Al-Wesabi4,5, Anwer Mustafa Hilal6,*, Mohammed Rizwanullah6, Abdelwahed Motwakel6, Ishfaq Yaseen6

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 2783-2795, 2022, DOI:10.32604/cmc.2022.025204

    Abstract Mobile edge computing (MEC) provides effective cloud services and functionality at the edge device, to improve the quality of service (QoS) of end users by offloading the high computation tasks. Currently, the introduction of deep learning (DL) and hardware technologies paves a method in detecting the current traffic status, data offloading, and cyberattacks in MEC. This study introduces an artificial intelligence with metaheuristic based data offloading technique for Secure MEC (AIMDO-SMEC) systems. The proposed AIMDO-SMEC technique incorporates an effective traffic prediction module using Siamese Neural Networks (SNN) to determine the traffic status in the MEC system. Also, an adaptive sampling… More >

  • Open Access

    ARTICLE

    Novel Dynamic Scaling Algorithm for Energy Efficient Cloud Computing

    M. Vinoth Kumar1, K. Venkatachalam2, Mehedi Masud3, Mohamed Abouhawwash4,5,*

    Intelligent Automation & Soft Computing, Vol.33, No.3, pp. 1547-1559, 2022, DOI:10.32604/iasc.2022.023961

    Abstract Huge data processing applications are stored efficiently using cloud computing platform. Few technologies like edge computing, Internet of Things (IoT) model helps cloud computing framework for executing data with less energy and latencies for better infrastructure. Recently researches focused on providing excellent services to cloud computing users. Also, cloud-based services are highly developed over IT field. Energy a level varies based on the cloud setup like speed, memory, service capability and bandwidth. The user job requirements are varied based its nature. The process of identifying efficient energy resources for the user job is main aim of this research work. Initially… More >

  • Open Access

    ARTICLE

    Flexible Task Scheduling Based on Edge Computing and Cloud Collaboration

    Suzhen Wang1,*, Wenli Wang1, Zhiting Jia1, Chaoyi Pang2

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1241-1255, 2022, DOI:10.32604/csse.2022.024021

    Abstract With the rapid development and popularization of 5G and the Internet of Things, a number of new applications have emerged, such as driverless cars. Most of these applications are time-delay sensitive, and some deficiencies were found during data processing through the cloud centric architecture. The data generated by terminals at the edge of the network is an urgent problem to be solved at present. In 5 g environments, edge computing can better meet the needs of low delay and wide connection applications, and support the fast request of terminal users. However, edge computing only has the edge layer computing advantage, and… More >

  • Open Access

    ARTICLE

    Cryptographic Lightweight Encryption Algorithm with Dimensionality Reduction in Edge Computing

    D. Jerusha*, T. Jaya

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1121-1132, 2022, DOI:10.32604/csse.2022.022997

    Abstract Edge Computing is one of the radically evolving systems through generations as it is able to effectively meet the data saving standards of consumers, providers and the workers. Requisition for Edge Computing based items have been increasing tremendously. Apart from the advantages it holds, there remain lots of objections and restrictions, which hinders it from accomplishing the need of consumers all around the world. Some of the limitations are constraints on computing and hardware, functions and accessibility, remote administration and connectivity. There is also a backlog in security due to its inability to create a trust between devices involved in… More >

Displaying 51-60 on page 6 of 99. Per Page