Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (20)
  • Open Access

    ARTICLE

    A Fault-Tolerant Mobility-Aware Caching Method in Edge Computing

    Yong Ma1, Han Zhao2, Kunyin Guo3,*, Yunni Xia3,*, Xu Wang4, Xianhua Niu5, Dongge Zhu6, Yumin Dong7

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 907-927, 2024, DOI:10.32604/cmes.2024.048759 - 16 April 2024

    Abstract Mobile Edge Computing (MEC) is a technology designed for the on-demand provisioning of computing and storage services, strategically positioned close to users. In the MEC environment, frequently accessed content can be deployed and cached on edge servers to optimize the efficiency of content delivery, ultimately enhancing the quality of the user experience. However, due to the typical placement of edge devices and nodes at the network’s periphery, these components may face various potential fault tolerance challenges, including network instability, device failures, and resource constraints. Considering the dynamic nature of MEC, making high-quality content caching decisions… More >

  • Open Access

    ARTICLE

    CF-BFT: A Dual-Mode Byzantine Fault-Tolerant Protocol Based on Node Authentication

    Zhiruo Zhang, Feng Wang*, Yang Liu, Yang Lu, Xinlei Liu

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3113-3129, 2023, DOI:10.32604/cmc.2023.040600 - 08 October 2023

    Abstract The consensus protocol is one of the core technologies in blockchain, which plays a crucial role in ensuring the block generation rate, consistency, and safety of the blockchain system. Blockchain systems mainly adopt the Byzantine Fault Tolerance (BFT) protocol, which often suffers from slow consensus speed and high communication consumption to prevent Byzantine nodes from disrupting the consensus. In this paper, this paper proposes a new dual-mode consensus protocol based on node identity authentication. It divides the consensus process into two subprotocols: Check_BFT and Fast_BFT. In Check_BFT, the replicas authenticate the primary’s identity by monitoring… More >

  • Open Access

    ARTICLE

    SFSDA: Secure and Flexible Subset Data Aggregation with Fault Tolerance for Smart Grid

    Dong Chen1, Tanping Zhou1,2,3,*, Xu An Wang1,2, Zichao Song1, Yujie Ding1, Xiaoyuan Yang1,2

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 2477-2497, 2023, DOI:10.32604/iasc.2023.039238 - 21 June 2023

    Abstract Smart grid (SG) brings convenience to users while facing great challenges in protecting personal private data. Data aggregation plays a key role in protecting personal privacy by aggregating all personal data into a single value, preventing the leakage of personal data while ensuring its availability. Recently, a flexible subset data aggregation (FSDA) scheme based on the Paillier homomorphic encryption was first proposed by Zhang et al. Their scheme can dynamically adjust the size of each subset and obtain the aggregated data in the corresponding subset. In this paper, firstly, an efficient attack with both theorems… More >

  • Open Access

    ARTICLE

    WiFi6 Dynamic Channel Optimization Method for Fault Tolerance in Power Communication Network

    Hong Zhu1, Lisha Gao1, Lei Wei1, Guangchang Yang2,*, Sujie Shao2

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5501-5519, 2023, DOI:10.32604/cmc.2023.035759 - 29 April 2023

    Abstract As the scale of power networks has expanded, the demand for multi-service transmission has gradually increased. The emergence of WiFi6 has improved the transmission efficiency and resource utilization of wireless networks. However, it still cannot cope with situations such as wireless access point (AP) failure. To solve this problem, this paper combines orthogonal frequency division multiple access (OFDMA) technology and dynamic channel optimization technology to design a fault-tolerant WiFi6 dynamic resource optimization method for achieving high quality wireless services in a wirelessly covered network even when an AP fails. First, under the premise of AP… More >

  • Open Access

    ARTICLE

    Novel Double Modular Redundancy Based Fault-Tolerant FIR Filter for Image Denoising

    V. S. Vaisakhi1,*, D. Surendran2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 181-193, 2023, DOI:10.32604/csse.2023.032514 - 20 January 2023

    Abstract In signal processing and communication systems, digital filters are widely employed. In some circumstances, the reliability of those systems is crucial, necessitating the use of fault tolerant filter implementations. Many strategies have been presented throughout the years to achieve fault tolerance by utilising the structure and properties of the filters. As technology advances, more complicated systems with several filters become possible. Some of the filters in those complicated systems frequently function in parallel, for example, by applying the same filter to various input signals. Recently, a simple strategy for achieving fault tolerance that takes advantage… More >

  • Open Access

    ARTICLE

    A Broker-Based Task-Scheduling Mechanism Using Replication Approach for Cloud Systems

    Abdulelah Alwabel*

    Intelligent Automation & Soft Computing, Vol.36, No.2, pp. 2217-2232, 2023, DOI:10.32604/iasc.2023.033703 - 05 January 2023

    Abstract The reliability and availability of cloud systems have become major concerns of service providers, brokers, and end-users. Therefore, studying fault-tolerance mechanisms in cloud computing attracts intense attention in industry and academia. The task-scheduling mechanisms can improve the fault-tolerance level of cloud systems. A task-scheduling mechanism distributes tasks to a group of instances to be executed. Much work has been undertaken in this direction to improve the overall outcome of cloud computing, such as improving service quality and reducing power consumption. However, little work on task scheduling has studied the problem of lost tasks from the… More >

  • Open Access

    ARTICLE

    Energy Efficient Unequal Fault Tolerance Clustering Approach

    Sowjanya Ramisetty1,2, Divya Anand2, Kavita3,*, Sahil Verma3, NZ Jhanjhi4, Mehedi Masud5, Mohammed Baz6

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1971-1983, 2023, DOI:10.32604/csse.2022.021924 - 03 November 2022

    Abstract For achieving Energy-Efficiency in wireless sensor networks (WSNs), different schemes have been proposed which focuses only on reducing the energy consumption. A shortest path determines for the Base Station (BS), but fault tolerance and energy balancing gives equal importance for improving the network lifetime. For saving energy in WSNs, clustering is considered as one of the effective methods for Wireless Sensor Networks. Because of the excessive overload, more energy consumed by cluster heads (CHs) in a cluster based WSN to receive and aggregate the information from member sensor nodes and it leads to failure. For… More >

  • Open Access

    ARTICLE

    A Single-Ended Protection Principle for LCC-VSC-MTDC System with High Resistance Fault Tolerance

    Dahai Zhang*, Chuanjian Wu, Jinghan He

    Energy Engineering, Vol.120, No.1, pp. 1-21, 2023, DOI:10.32604/ee.2022.023304 - 27 October 2022

    Abstract Line-commutated converter-voltage source converter (LCC-VSC) power transmission technology does not have the problem of communication failure very usually. It therefore can support the long-distance, long-capacity transmission of electric energy. However, factors such as topology, control strategy, and short-circuit capacities make the traditional protection principles not fully applicable to LCC-VSC hybrid transmission systems. To enhance the reliability of hybrid DC systems, a single-ended principle based on transmission coefficients is proposed and produced. First, the equivalent circuit of the LCC-VSC hybrid DC system is analyzed and the expression of the first traveling wave is deduced accordingly. Then, More >

  • Open Access

    ARTICLE

    An Optimal Cluster Head and Gateway Node Selection with Fault Tolerance

    P. Rahul*, B. Kaarthick

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1595-1609, 2023, DOI:10.32604/iasc.2023.025762 - 19 July 2022

    Abstract In Mobile Ad Hoc Networks (MANET), Quality of Service (QoS) is an important factor that must be analysed for the showing the better performance. The Node Quality-based Clustering Algorithm using Fuzzy-Fruit Fly Optimization for Cluster Head and Gateway Selection (NQCAFFFOCHGS) has the best network performance because it uses the Improved Weighted Clustering Algorithm (IWCA) to cluster the network and the FFO algorithm, which uses fuzzy-based network metrics to select the best CH and entryway. However, the major drawback of the fuzzy system was to appropriately select the membership functions. Also, the network metrics related to… More >

  • Open Access

    ARTICLE

    Hybrid Smart Contracts for Securing IoMT Data

    D. Palanikkumar1, Adel Fahad Alrasheedi2, P. Parthasarathi3, S. S. Askar2, Mohamed Abouhawwash4,5,*

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 457-469, 2023, DOI:10.32604/csse.2023.024884 - 01 June 2022

    Abstract Data management becomes essential component of patient healthcare. Internet of Medical Things (IoMT) performs a wireless communication between E-medical applications and human being. Instead of consulting a doctor in the hospital, patients get health related information remotely from the physician. The main issues in the E-Medical application are lack of safety, security and privacy preservation of patient’s health care data. To overcome these issues, this work proposes block chain based IoMT Processed with Hybrid consensus protocol for secured storage. Patients health data is collected from physician, smart devices etc. The main goal is to store More >

Displaying 1-10 on page 1 of 20. Per Page