Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (289)
  • Open Access

    ARTICLE

    A Novel Features Prioritization Mechanism for Controllers in Software-Defined Networking

    Jehad Ali1, Byungkyu Lee2, Jimyung Oh2, Jungtae Lee3, Byeong-hee Roh1,*

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 267-282, 2021, DOI:10.32604/cmc.2021.017813

    Abstract The controller in software-defined networking (SDN) acts as strategic point of control for the underlying network. Multiple controllers are available, and every single controller retains a number of features such as the OpenFlow version, clustering, modularity, platform, and partnership support, etc. They are regarded as vital when making a selection among a set of controllers. As such, the selection of the controller becomes a multi-criteria decision making (MCDM) problem with several features. Hence, an increase in this number will increase the computational complexity of the controller selection process. Previously, the selection of controllers based on features has been studied by… More >

  • Open Access

    ARTICLE

    Complex Problems Solution as a Service Based on Predictive Optimization and Tasks Orchestration in Smart Cities

    Shabir Ahmad1, Jehad Ali2, Faisal Jamil3, Taeg Keun Whangbo1, DoHyeun Kim3,*

    CMC-Computers, Materials & Continua, Vol.69, No.1, pp. 1271-1288, 2021, DOI:10.32604/cmc.2021.017773

    Abstract Smart cities have different contradicting goals having no apparent solution. The selection of the appropriate solution, which is considered the best compromise among the candidates, is known as complex problem-solving. Smart city administrators face different problems of complex nature, such as optimal energy trading in microgrids and optimal comfort index in smart homes, to mention a few. This paper proposes a novel architecture to offer complex problem solutions as a service (CPSaaS) based on predictive model optimization and optimal task orchestration to offer solutions to different problems in a smart city. Predictive model optimization uses a machine learning module and… More >

  • Open Access

    ARTICLE

    Development of a Multi-feature Web-based Physiotherapy Service System

    Sadman Ahmed1, Mohammad Monirujjaman Khan1,*, Roobaea Alroobaea2, Mehedi Masud2

    Intelligent Automation & Soft Computing, Vol.29, No.1, pp. 43-54, 2021, DOI:10.32604/iasc.2021.015914

    Abstract Physiotherapy is important to people with arthritis, and physiotherapists help them to resume or continue active, independent lives at home and work. Physiotherapy addresses many pain categories; however, this important treatment is still overlooked in Bangladesh, where many people suffer from physical pain. This study presents a multi-feature web-based physiotherapy application. A user can register as a doctor or patient via email or phone using the web application. A therapist’s information is verified manually by a system administrator. Using the application, patients can select a variety of features for treatment. Patients can watch physiotherapy video tutorials, find a physiotherapy clinic… More >

  • Open Access

    ARTICLE

    Hybrid Swarm Intelligence Based QoS Aware Clustering with Routing Protocol for WSN

    M. S. Maharajan1, T. Abirami2, Irina V. Pustokhina3, Denis A. Pustokhin4, K. Shankar5,*

    CMC-Computers, Materials & Continua, Vol.68, No.3, pp. 2995-3013, 2021, DOI:10.32604/cmc.2021.016139

    Abstract Wireless Sensor Networks (WSN) started gaining attention due to its wide application in the fields of data collection and information processing. The recent advancements in multimedia sensors demand the Quality of Service (QoS) be maintained up to certain standards. The restrictions and requirements in QoS management completely depend upon the nature of target application. Some of the major QoS parameters in WSN are energy efficiency, network lifetime, delay and throughput. In this scenario, clustering and routing are considered as the most effective techniques to meet the demands of QoS. Since they are treated as NP (Non-deterministic Polynomial-time) hard problem, Swarm… More >

  • Open Access

    ARTICLE

    IoT Services: Realizing Private Real-Time Detection via Authenticated Conjunctive Searchable Encryption

    Chungen Xu1,*, Lin Mei1, Jinxue Cheng2, Yu Zhao1, Cong Zuo3

    Journal of Cyber Security, Vol.3, No.1, pp. 55-67, 2021, DOI:10.32604/jcs.2021.017217

    Abstract With the rapid development of wireless communication technology, the Internet of Things is playing an increasingly important role in our everyday. The amount of data generated by sensor devices is increasing as a large number of connectable devices are deployed in many fields, including the medical, agricultural, and industrial areas. Uploading data to the cloud solves the problem of data overhead but results in privacy issues. Therefore, the question of how to manage the privacy of uploading data and make it available to be interconnected between devices is a crucial issue. In this paper, we propose a scheme that supports… More >

  • Open Access

    ARTICLE

    An Ensemble Approach to Identify Firearm Listing on Tor Hidden-Services

    Hashem Alyami1, Mohd Faizan2, Wael Alosaimi3, Abdullah Alharbi3, Abhishek Kumar Pandey2, Md Tarique Jamal Ansari4, Alka Agrawal2, Raees Ahmad Khan2,*

    Computer Systems Science and Engineering, Vol.38, No.2, pp. 141-149, 2021, DOI:10.32604/csse.2021.017039

    Abstract The ubiquitous nature of the internet has made it easier for criminals to carry out illegal activities online. The sale of illegal firearms and weaponry on dark web cryptomarkets is one such example of it. To aid the law enforcement agencies in curbing the illicit trade of firearms on cryptomarkets, this paper has proposed an automated technique employing ensemble machine learning models to detect the firearms listings on cryptomarkets. In this work, we have used part-of-speech (PoS) tagged features in conjunction with n-gram models to construct the feature set for the ensemble model. We studied the effectiveness of the proposed… More >

  • Open Access

    ARTICLE

    Transmission Control under Multi-Service Disciplines in Wireless Sensor Networks

    Cheng Gong1, Dingbang Xie2, Chao Guo2,*, Sonia Kherbachi3

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2127-2143, 2021, DOI:10.32604/cmc.2021.016436

    Abstract The wireless sensor network (WSN), as the terminal data acquisition system of the 5G network, has attracted attention due to advantages such as low cost and easy deployment. Its development is mainly restricted by energy. The traditional transmission control scheme is not suitable for WSNs due to the significant information interaction. A switchable transmission control scheme for WSNs based on a queuing game (SQGTC) is proposed to improve network performance. Considering that sensor nodes compete for the resources of sink nodes to realize data transmission, the competitive relationship between nodes is described from the perspective of a game. Different types… More >

  • Open Access

    ARTICLE

    Optimizing Service Composition (SC) Using Smart Multistage Forward Search (SMFS)

    Issam Alhadid1, Hassan Tarawneh2, Khalid Kaabneh2, Ra’ed Masa’deh3, Nawaf N. Hamadneh4,*, Muhammad Tahir5, Sufian Khwaldeh1

    Intelligent Automation & Soft Computing, Vol.28, No.2, pp. 321-336, 2021, DOI:10.32604/iasc.2021.014892

    Abstract

    Service Oriented Architecture (SOA) is a style of software design where Web Services (WS) provide services to the other components through a communication protocol over a network. WS components are managed, updated, and rearranged at runtime to provide the business processes as SCs, which consist of a set of WSs that can be invoked in a specific order to fulfill the clients’ requests. According to the Service Level Agreement (SLA) requirements, WS selection and composition are significant perspectives of research to meet the clients’ expectations. This paper presents an effective technique using SMFS that attempts to improve the WS selection… More >

  • Open Access

    ARTICLE

    Data Fusion about Serviceability Reliability Prediction for the Long-Span Bridge Girder Based on MBDLM and Gaussian Copula Technique

    Xueping Fan*, Guanghong Yang, Zhipeng Shang, Xiaoxiong Zhao, Yuefei Liu*

    Structural Durability & Health Monitoring, Vol.15, No.1, pp. 69-83, 2021, DOI:10.32604/sdhm.2021.011922

    Abstract This article presented a new data fusion approach for reasonably predicting dynamic serviceability reliability of the long-span bridge girder. Firstly, multivariate Bayesian dynamic linear model (MBDLM) considering dynamic correlation among the multiple variables is provided to predict dynamic extreme deflections; secondly, with the proposed MBDLM, the dynamic correlation coefficients between any two performance functions can be predicted; finally, based on MBDLM and Gaussian copula technique, a new data fusion method is given to predict the serviceability reliability of the long-span bridge girder, and the monitoring extreme deflection data from an actual bridge is provided to illustrated the feasibility and application… More >

  • Open Access

    ARTICLE

    A Link Analysis Algorithm for Identification of Key Hidden Services

    Abdullah Alharbi1, Mohd Faizan2, Wael Alosaimi1, Hashem Alyami3, Mohd Nadeem2, Suhel Ahmad Khan4, Alka Agrawal2, Raees Ahmad Khan2,*

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 877-886, 2021, DOI:10.32604/cmc.2021.016887

    Abstract The Tor dark web network has been reported to provide a breeding ground for criminals and fraudsters who are exploiting the vulnerabilities in the network to carry out illicit and unethical activities. The network has unfortunately become a means to perpetuate crimes like illegal drugs and firearm trafficking, violence and terrorist activities among others. The government and law enforcement agencies are working relentlessly to control the misuse of Tor network. This is a study in the similar league, with an attempt to suggest a link-based ranking technique to rank and identify the influential hidden services in the Tor dark web.… More >

Displaying 191-200 on page 20 of 289. Per Page