Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (65)
  • Open Access

    ARTICLE

    Securing 3D Point and Mesh Fog Data Using Novel Chaotic Cat Map

    K. Priyadarsini1, Arun Kumar Sivaraman2, Abdul Quadir Md2, Areej Malibari3,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6703-6717, 2023, DOI:10.32604/cmc.2023.030648

    Abstract With the rapid evolution of Internet technology, fog computing has taken a major role in managing large amounts of data. The major concerns in this domain are security and privacy. Therefore, attaining a reliable level of confidentiality in the fog computing environment is a pivotal task. Among different types of data stored in the fog, the 3D point and mesh fog data are increasingly popular in recent days, due to the growth of 3D modelling and 3D printing technologies. Hence, in this research, we propose a novel scheme for preserving the privacy of 3D point and mesh fog data. Chaotic… More >

  • Open Access

    ARTICLE

    An Optimized Offloaded Task Execution for Smart Cities Applications

    Ahmad Naseem Alvi1, Muhammad Awais Javed1,*, Mozaherul Hoque Abul Hasanat2, Muhammad Badruddin Khan2, Abdul Khader Jilani Saudagar2, Mohammed Alkhathami2

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6321-6334, 2023, DOI:10.32604/cmc.2023.029913

    Abstract Wireless nodes are one of the main components in different applications that are offered in a smart city. These wireless nodes are responsible to execute multiple tasks with different priority levels. As the wireless nodes have limited processing capacity, they offload their tasks to cloud servers if the number of tasks exceeds their task processing capacity. Executing these tasks from remotely placed cloud servers causes a significant delay which is not required in sensitive task applications. This execution delay is reduced by placing fog computing nodes near these application nodes. A fog node has limited processing capacity and is sometimes… More >

  • Open Access

    ARTICLE

    Numerical Simulation of Contamination Accumulation Characteristics of Composite Insulators in Salt Fog Environment

    Yukun Lv, Zeze Chen*, Quanzhi Ge, Qian Wang, Yazhao Zhang

    Energy Engineering, Vol.120, No.2, pp. 483-499, 2023, DOI:10.32604/ee.2023.023649

    Abstract To investigate the fouling characteristics of the composite insulator surface under the salt fog environment, the FXBW-110/120-2 composite insulator was taken as the research object. Based on the field-induced charge mechanism, the multi-physical field coupling software COMSOL was used to numerically simulate the fouling characteristics, explored the calculation method of ESDD, and demonstrated its rationality. Based on this method, the pollution characteristics of the composite insulator under the pollution fog environment were studied, and the influence of wind speed, droplet size, and voltage type on the pollution characteristics of the composite insulator was analyzed. The results showed that: with the… More > Graphic Abstract

    Numerical Simulation of Contamination Accumulation Characteristics of Composite Insulators in Salt Fog Environment

  • Open Access

    ARTICLE

    Healthcare Monitoring Using Ensemble Classifiers in Fog Computing Framework

    P. M. Arunkumar1, Mehedi Masud2, Sultan Aljahdali2, Mohamed Abouhawwash3,4,*

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2265-2280, 2023, DOI:10.32604/csse.2023.032571

    Abstract Nowadays, the cloud environment faces numerous issues like synchronizing information before the switch over the data migration. The requirement for a centralized internet of things (IoT)-based system has been restricted to some extent. Due to low scalability on security considerations, the cloud seems uninteresting. Since healthcare networks demand computer operations on large amounts of data, the sensitivity of device latency evolved among health networks is a challenging issue. In comparison to cloud domains, the new paradigms of fog computing give fresh alternatives by bringing resources closer to users by providing low latency and energy-efficient data processing solutions. Previous fog computing… More >

  • Open Access

    ARTICLE

    Efficient-Cost Task Offloading Scheme in Fog-Internet of Vehicle Networks

    Alla Abbas Khadir1, Seyed Amin Hosseini Seno1,2,*, Baydaa Fadhil Dhahir2,3, Rahmat Budiarto4

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2223-2234, 2023, DOI:10.32604/csse.2023.032316

    Abstract Fog computing became a traditional OffLad Destination (OLD) to compute the offloaded tasks of the Internet of Vehicles (IoV). Nevertheless, the limited computing resources of the fog node leads to re-offload these tasks to the neighboring fog nodes or the cloud. Thus, the IoV will incur additional offloading costs. In this paper, we propose a new offloading scheme by utilizing RoadSide Parked Vehicles (RSPV) as an alternative OLD for IoV. The idle computing resources of the RSPVs can compute large tasks with low offloading costs compared with fog nodes and the cloud. Finally, a performance evaluation of the proposed scheme… More >

  • Open Access

    ARTICLE

    An Edge-Fog-Cloud Computing-Based Digital Twin Model for Prognostics Health Management of Process Manufacturing Systems

    Jie Ren1,2, Chuqiao Xu3, Junliang Wang2,4, Jie Zhang2,*, Xinhua Mao4, Wei Shen4

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 599-618, 2023, DOI:10.32604/cmes.2022.022415

    Abstract The prognostics health management (PHM) from the systematic view is critical to the healthy continuous operation of process manufacturing systems (PMS), with different kinds of dynamic interference events. This paper proposes a three leveled digital twin model for the systematic PHM of PMSs. The unit-leveled digital twin model of each basic device unit of PMSs is constructed based on edge computing, which can provide real-time monitoring and analysis of the device status. The station-leveled digital twin models in the PMSs are designed to optimize and control the process parameters, which are deployed for the manufacturing execution on the fog server.… More >

  • Open Access

    ARTICLE

    E-MOGWO Algorithm for Computation Offloading in Fog Computing

    Jyoti Yadav*, Suman

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 1063-1078, 2023, DOI:10.32604/iasc.2023.032883

    Abstract Despite the advances mobile devices have endured, they still remain resource-restricted computing devices, so there is a need for a technology that supports these devices. An emerging technology that supports such resource-constrained devices is called fog computing. End devices can offload the task to close-by fog nodes to improve the quality of service and experience. Since computation offloading is a multiobjective problem, we need to consider many factors before taking offloading decisions, such as task length, remaining battery power, latency, communication cost, etc. This study uses the multiobjective grey wolf optimization (MOGWO) technique for optimizing offloading decisions. This is the… More >

  • Open Access

    ARTICLE

    Health Data Deduplication Using Window Chunking-Signature Encryption in Cloud

    G. Neelamegam*, P. Marikkannu

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 1079-1093, 2023, DOI:10.32604/iasc.2023.031283

    Abstract Due to the development of technology in medicine, millions of health-related data such as scanning the images are generated. It is a great challenge to store the data and handle a massive volume of data. Healthcare data is stored in the cloud-fog storage environments. This cloud-Fog based health model allows the users to get health-related data from different sources, and duplicated information is also available in the background. Therefore, it requires an additional storage area, increase in data acquisition time, and insecure data replication in the environment. This paper is proposed to eliminate the de-duplication data using a window size… More >

  • Open Access

    ARTICLE

    Intrusion Detection Based on Bidirectional Long Short-Term Memory with Attention Mechanism

    Yongjie Yang1, Shanshan Tu1, Raja Hashim Ali2, Hisham Alasmary3,4, Muhammad Waqas5,6,*, Muhammad Nouman Amjad7

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 801-815, 2023, DOI:10.32604/cmc.2023.031907

    Abstract With the recent developments in the Internet of Things (IoT), the amount of data collected has expanded tremendously, resulting in a higher demand for data storage, computational capacity, and real-time processing capabilities. Cloud computing has traditionally played an important role in establishing IoT. However, fog computing has recently emerged as a new field complementing cloud computing due to its enhanced mobility, location awareness, heterogeneity, scalability, low latency, and geographic distribution. However, IoT networks are vulnerable to unwanted assaults because of their open and shared nature. As a result, various fog computing-based security models that protect IoT networks have been developed.… More >

  • Open Access

    ARTICLE

    Hierarchical Data Aggregation with Data Offloading Scheme for Fog Enabled IoT Environment

    P. Nalayini1,*, R. Arun Prakash2

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2033-2047, 2023, DOI:10.32604/csse.2023.028269

    Abstract Fog computing is a promising technology that has been emerged to handle the growth of smart devices as well as the popularity of latency-sensitive and location-awareness Internet of Things (IoT) services. After the emergence of IoT-based services, the industry of internet-based devices has grown. The number of these devices has raised from millions to billions, and it is expected to increase further in the near future. Thus, additional challenges will be added to the traditional centralized cloud-based architecture as it will not be able to handle that growth and to support all connected devices in real-time without affecting the user… More >

Displaying 21-30 on page 3 of 65. Per Page