Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (45)
  • Open Access

    ARTICLE

    Load Balancing Based on Multi-Agent Framework to Enhance Cloud Environment

    Shrouk H. Hessen1,2,*, Hatem M. Abdul-kader1, Ayman E. Khedr3, Rashed K. Salem1

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3015-3028, 2023, DOI:10.32604/cmc.2023.033212

    Abstract According to the advances in users’ service requirements, physical hardware accessibility, and speed of resource delivery, Cloud Computing (CC) is an essential technology to be used in many fields. Moreover, the Internet of Things (IoT) is employed for more communication flexibility and richness that are required to obtain fruitful services. A multi-agent system might be a proper solution to control the load balancing of interaction and communication among agents. This paper proposes a multi-agent load balancing framework that consists of two phases to optimize the workload among different servers with large-scale CC power with various… More >

  • Open Access

    ARTICLE

    Observer-Based Control for a Cable-Driven Aerial Manipulator under Lumped Disturbances

    Li Ding, Yong Yao*, Rui Ma

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.2, pp. 1539-1558, 2023, DOI:10.32604/cmes.2022.023003

    Abstract With the increasing demand for interactive aerial operations, the application of aerial manipulators is becoming more promising. However, there are a few critical problems on how to improve the energetic efficiency and pose control of the aerial manipulator for practical application. In this paper, a novel cable-driven aerial manipulator used for remote water sampling is proposed and then its rigid-flexible coupling dynamics model is constructed which takes joint flexibility into account. To achieve high precision joint position tracking under lumped disturbances, a newly controller, which consists of three parts: linear extended state observer, adaptive super-twisting More >

  • Open Access

    ARTICLE

    Optimal Joint Space Control of a Cable-Driven Aerial Manipulator

    Li Ding1,*, Rui Ma1, Zhengtian Wu2, Rongzhi Qi1, Wenrui Ruan1

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 441-464, 2023, DOI:10.32604/cmes.2022.022642

    Abstract This article proposes a novel method for maintaining the trajectory of an aerial manipulator by utilizing a fast nonsingular terminal sliding mode (FNTSM) manifold and a linear extended state observer (LESO). The developed control method applies an FNTSM to ensure the tracking performance’s control accuracy, and an LESO to estimate the system’s unmodeled dynamics and external disturbances. Additionally, an improved salp swarm algorithm (ISSA) is employed to parameter tune the suggested controller by integrating the salp swarm technique with a cloud model. This approach also uses a model-free scheme to reduce the complexity of controller More >

  • Open Access

    ARTICLE

    Multiway Relay Based Framework for Network Coding in Multi-Hop WSNs

    Vinod Kumar Menaria1, Anand Nayyar2, Sandeep Kumar3, Ketan Kotecha4,*

    CMC-Computers, Materials & Continua, Vol.74, No.1, pp. 1199-1216, 2023, DOI:10.32604/cmc.2023.032162

    Abstract In today’s information technology (IT) world, the multi-hop wireless sensor networks (MHWSNs) are considered the building block for the Internet of Things (IoT) enabled communication systems for controlling everyday tasks of organizations and industry to provide quality of service (QoS) in a stipulated time slot to end-user over the Internet. Smart city (SC) is an example of one such application which can automate a group of civil services like automatic control of traffic lights, weather prediction, surveillance, etc., in our daily life. These IoT-based networks with multi-hop communication and multiple sink nodes provide efficient communication… More >

  • Open Access

    ARTICLE

    Active Authentication Protocol for IoV Environment with Distributed Servers

    Saravanan Manikandan1, Mosiur Rahaman1, Yu-Lin Song1,2,*

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5789-5808, 2022, DOI:10.32604/cmc.2022.031490

    Abstract The Internet of Vehicles (IoV) has evolved as an advancement over the conventional Vehicular Ad-hoc Networks (VANETs) in pursuing a more optimal intelligent transportation system that can provide various intelligent solutions and enable a variety of applications for vehicular traffic. Massive volumes of data are produced and communicated wirelessly among the different relayed entities in these vehicular networks, which might entice adversaries and endanger the system with a wide range of security attacks. To ensure the security of such a sensitive network, we proposed a distributed authentication mechanism for IoV based on blockchain technology as… More >

  • Open Access

    ARTICLE

    A Secure Multiparty Quantum Homomorphic Encryption Scheme

    Jing-Wen Zhang1, Xiu-Bo Chen1,*, Gang Xu2,3, Heng-Ji Li4, Ya-Lan Wang5, Li-Hua Miao6, Yi-Xian Yang1

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2835-2848, 2022, DOI:10.32604/cmc.2022.029125

    Abstract The significant advantage of the quantum homomorphic encryption scheme is to ensure the perfect security of quantum private data. In this paper, a novel secure multiparty quantum homomorphic encryption scheme is proposed, which can complete arbitrary quantum computation on the private data of multiple clients without decryption by an almost dishonest server. Firstly, each client obtains a secure encryption key through the measurement device independent quantum key distribution protocol and encrypts the private data by using the encryption operator and key. Secondly, with the help of the almost dishonest server, the non-maximally entangled states are… More >

  • Open Access

    ARTICLE

    Rider Optimization Algorithm Based Optimal Cloud Server Selection in E-Learning

    R. Soundhara Raja Pandian*, C. Christopher Columbus

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1749-1762, 2023, DOI:10.32604/csse.2023.028014

    Abstract Currently, e-learning is one of the most prevalent educational methods because of its need in today’s world. Virtual classrooms and web-based learning are becoming the new method of teaching remotely. The students experience a lack of access to resources commonly the educational material. In remote locations, educational institutions face significant challenges in accessing various web-based materials due to bandwidth and network infrastructure limitations. The objective of this study is to demonstrate an optimization and queueing technique for allocating optimal servers and slots for users to access cloud-based e-learning applications. The proposed method provides the optimization… More >

  • Open Access

    ARTICLE

    An Efficient Framework for Utilizing Underloaded Servers in Compute Cloud

    M. Hema1,*, S. Kanaga Suba Raja2

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 143-156, 2023, DOI:10.32604/csse.2023.024895

    Abstract In cloud data centers, the consolidation of workload is one of the phases during which the available hosts are allocated tasks. This phenomenon ensures that the least possible number of hosts is used without compromise in meeting the Service Level Agreement (SLA). To consolidate the workloads, the hosts are segregated into three categories: normal hosts, under-loaded hosts, and overloaded hosts based on their utilization. It is to be noted that the identification of an extensively used host or underloaded host is challenging to accomplish. Threshold values were proposed in the literature to detect this scenario.… More >

  • Open Access

    ARTICLE

    Phish Block: A Blockchain Framework for Phish Detection in Cloud

    R. N. Karthika*, C. Valliyammai, M. Naveena

    Computer Systems Science and Engineering, Vol.44, No.1, pp. 777-795, 2023, DOI:10.32604/csse.2023.024086

    Abstract The data in the cloud is protected by various mechanisms to ensure security aspects and user’s privacy. But, deceptive attacks like phishing might obtain the user’s data and use it for malicious purposes. In Spite of much technological advancement, phishing acts as the first step in a series of attacks. With technological advancements, availability and access to the phishing kits has improved drastically, thus making it an ideal tool for the hackers to execute the attacks. The phishing cases indicate use of foreign characters to disguise the original Uniform Resource Locator (URL), typosquatting the popular… More >

  • Open Access

    ARTICLE

    Aggregated PSO for Secure Data Transmission in WSN Using Fog Server

    M. Manicka Raja1,*, S. Manoj Kumar2

    Intelligent Automation & Soft Computing, Vol.34, No.2, pp. 1017-1032, 2022, DOI:10.32604/iasc.2022.025665

    Abstract Privacy of data in Internet of Things (IoT) over fog networks is the biggest challenge in security of Wireless communication networks. In Wireless Sensor Network (WSN), current research on fog computing with IoT is gaining popularity among IoT devices over network. Moreover, the data aggregation will reduce the energy consumption in WSN. Due to the open and hostile nature of WSN, secure data aggregation is the major issue. The existing data aggregation methods in IoT and its associated approaches are lack of limited aggregation functions, heavyweight, issues related to the performance overhead. Besides, the overload… More >

Displaying 11-20 on page 2 of 45. Per Page