Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (11)
  • Open Access

    ARTICLE

    A Fault-Tolerant Mobility-Aware Caching Method in Edge Computing

    Yong Ma1, Han Zhao2, Kunyin Guo3,*, Yunni Xia3,*, Xu Wang4, Xianhua Niu5, Dongge Zhu6, Yumin Dong7

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 907-927, 2024, DOI:10.32604/cmes.2024.048759

    Abstract Mobile Edge Computing (MEC) is a technology designed for the on-demand provisioning of computing and storage services, strategically positioned close to users. In the MEC environment, frequently accessed content can be deployed and cached on edge servers to optimize the efficiency of content delivery, ultimately enhancing the quality of the user experience. However, due to the typical placement of edge devices and nodes at the network’s periphery, these components may face various potential fault tolerance challenges, including network instability, device failures, and resource constraints. Considering the dynamic nature of MEC, making high-quality content caching decisions for real-time mobile applications, especially… More >

  • Open Access

    ARTICLE

    Fractional Gradient Descent RBFNN for Active Fault-Tolerant Control of Plant Protection UAVs

    Lianghao Hua1,2, Jianfeng Zhang1,*, Dejie Li3, Xiaobo Xi1

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2129-2157, 2024, DOI:10.32604/cmes.2023.030535

    Abstract With the increasing prevalence of high-order systems in engineering applications, these systems often exhibit significant disturbances and can be challenging to model accurately. As a result, the active disturbance rejection controller (ADRC) has been widely applied in various fields. However, in controlling plant protection unmanned aerial vehicles (UAVs), which are typically large and subject to significant disturbances, load disturbances and the possibility of multiple actuator faults during pesticide spraying pose significant challenges. To address these issues, this paper proposes a novel fault-tolerant control method that combines a radial basis function neural network (RBFNN) with a second-order ADRC and leverages a… More > Graphic Abstract

    Fractional Gradient Descent RBFNN for Active Fault-Tolerant Control of Plant Protection UAVs

  • Open Access

    ARTICLE

    CF-BFT: A Dual-Mode Byzantine Fault-Tolerant Protocol Based on Node Authentication

    Zhiruo Zhang, Feng Wang*, Yang Liu, Yang Lu, Xinlei Liu

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3113-3129, 2023, DOI:10.32604/cmc.2023.040600

    Abstract The consensus protocol is one of the core technologies in blockchain, which plays a crucial role in ensuring the block generation rate, consistency, and safety of the blockchain system. Blockchain systems mainly adopt the Byzantine Fault Tolerance (BFT) protocol, which often suffers from slow consensus speed and high communication consumption to prevent Byzantine nodes from disrupting the consensus. In this paper, this paper proposes a new dual-mode consensus protocol based on node identity authentication. It divides the consensus process into two subprotocols: Check_BFT and Fast_BFT. In Check_BFT, the replicas authenticate the primary’s identity by monitoring its behaviors. First, assume that… More >

  • Open Access

    ARTICLE

    Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor Networks

    Yang Zhao1, Jingmin An1, Hao Li1, Saru Kumari2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 555-575, 2023, DOI:10.32604/cmes.2023.026808

    Abstract The vehicular sensor network (VSN) is an important part of intelligent transportation, which is used for real-time detection and operation control of vehicles and real-time transmission of data and information. In the environment of VSN, massive private data generated by vehicles are transmitted in open channels and used by other vehicle users, so it is crucial to maintain high transmission efficiency and high confidentiality of data. To deal with this problem, in this paper, we propose a heterogeneous fault-tolerant aggregate signcryption scheme with an equality test (HFTAS-ET). The scheme combines fault-tolerant and aggregate signcryption, which not only makes up for… More > Graphic Abstract

    Heterogeneous Fault-Tolerant Aggregate Signcryption with Equality Test for Vehicular Sensor Networks

  • Open Access

    ARTICLE

    Detection of Phishing in Internet-of-Things Using Hybrid Deep Belief Network

    S. Ashwini*, S. Magesh Kumar

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3043-3056, 2023, DOI:10.32604/iasc.2023.034551

    Abstract Increase in the use of internet of things owned devices is one of the reasons for increased network traffic. While connecting the smart devices with publicly available network many kinds of phishing attacks are able to enter into the mobile devices and corrupt the existing system. The Phishing is the slow and resilient attack stacking techniques probe the users. The proposed model is focused on detecting phishing attacks in internet of things enabled devices through a robust algorithm called Novel Watch and Trap Algorithm (NWAT). Though Predictive mapping, Predictive Validation and Predictive analysis mechanism is developed. For the test purpose… More >

  • Open Access

    ARTICLE

    Novel Double Modular Redundancy Based Fault-Tolerant FIR Filter for Image Denoising

    V. S. Vaisakhi1,*, D. Surendran2

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 181-193, 2023, DOI:10.32604/csse.2023.032514

    Abstract In signal processing and communication systems, digital filters are widely employed. In some circumstances, the reliability of those systems is crucial, necessitating the use of fault tolerant filter implementations. Many strategies have been presented throughout the years to achieve fault tolerance by utilising the structure and properties of the filters. As technology advances, more complicated systems with several filters become possible. Some of the filters in those complicated systems frequently function in parallel, for example, by applying the same filter to various input signals. Recently, a simple strategy for achieving fault tolerance that takes advantage of the availability of parallel… More >

  • Open Access

    REVIEW

    Intelligent Identification over Power Big Data: Opportunities, Solutions, and Challenges

    Liang Luo1, Xingmei Li1, Kaijiang Yang1, Mengyang Wei1, Jiong Chen1, Junqian Yang1, Liang Yao2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.3, pp. 1565-1595, 2023, DOI:10.32604/cmes.2022.021198

    Abstract The emergence of power dispatching automation systems has greatly improved the efficiency of power industry operations and promoted the rapid development of the power industry. However, with the convergence and increase in power data flow, the data dispatching network and the main station dispatching automation system have encountered substantial pressure. Therefore, the method of online data resolution and rapid problem identification of dispatching automation systems has been widely investigated. In this paper, we perform a comprehensive review of automated dispatching of massive dispatching data from the perspective of intelligent identification, discuss unresolved research issues and outline future directions in this… More >

  • Open Access

    ARTICLE

    Fault Tolerance Techniques for Multi-Hop Clustering in Wireless Sensor Networks

    Adel Rajab*

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1743-1761, 2022, DOI:10.32604/iasc.2022.021922

    Abstract Wireless sensor networks (WSN) deploy many nodes over an extended area for traffic surveillance, environmental monitoring, healthcare, tracking wildlife, and military sensing. Nodes of the WSN have a limited amount of energy. Each sensor node collects information from the surrounding area and forwards it onto the cluster head, which then sends it on to the base station (BS). WSNs extend the lifetime of the network through clustering techniques. Choosing nodes with the greatest residual energy as cluster heads is based on the idea that energy consumption is periodically distributed between nodes. The sink node gathers information from its environment that… More >

  • Open Access

    ARTICLE

    Fault-Tolerant Communication Induced Checkpointing and Recovery Protocol Using IoT

    Neha Malhotra1,2,*, Manju Bala3

    Intelligent Automation & Soft Computing, Vol.30, No.3, pp. 945-960, 2021, DOI:10.32604/iasc.2021.019082

    Abstract In mobile computing systems, nodes in the network take checkpoints to survive failures. Certain characteristics of mobile computing systems such as mobility, low bandwidth, disconnection, low power consumption, and limited memory make these systems more prone to failures. In this paper, a novel minimum process communication-induced checkpointing algorithm that makes full use of the computation ability and implementation of effective stable storage in a mobile computing system is proposed. The said approach initiates by taking spontaneous checkpoints by each node in phase 1 using a logistic function that is specifically used to estimate the time interval between two checkpoints and… More >

  • Open Access

    ARTICLE

    Gender Recognition Based on Computer Vision System

    Li-Hong Juanga, Ming-Ni Wub, Shin-An Linb

    Intelligent Automation & Soft Computing, Vol.24, No.2, pp. 249-256, 2018, DOI:10.1080/10798587.2016.1272777

    Abstract Detecting human gender from complex background, illumination variations and objects under computer vision system is very difficult but important for an adaptive information service. In this paper, a preliminary design and some experimental results of gender recognition will be presented from the walking movement that utilizes the gait-energy image (GEI) with denoised energy image (DEI) pre-processing as a machine learning support vector machine (SVM) classifier to train and extract its characteristics. The results show that the proposed method can adopt some characteristic values and the accuracy can reach up to 100% gender recognition rate under combining the horizontal added vertical… More >

Displaying 1-10 on page 1 of 11. Per Page