Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (353)
  • Open Access

    ARTICLE

    DNS Service Model Based on Permissioned Blockchain

    Yantao Shen1,*, Yang Lu2, Zhili Wang1, Xin Xv3, Feng Qi1, Ningzhe Xing4, Ziyu Zhao5

    Intelligent Automation & Soft Computing, Vol.27, No.1, pp. 259-268, 2021, DOI:10.32604/iasc.2021.013704 - 07 January 2021

    Abstract With the continuous development of the Internet, the domain name system (DNS) as infrastructure is playing an increasingly important role. However, traditional DNS architecture is centralized, and there are some security problems such as the right concentration and power abuse. This paper combines blockchain technology with DNS technology and proposes a domain name service model based on the permissioned blockchain. At first, this paper designs a top-level domain chain (TLDChain) model to conduct consensus on block transactions and achieve decentralization of domain name service. Then, this paper introduces a data model to upload data. At More >

  • Open Access

    ARTICLE

    Machine Learning Empowered Security Management and Quality of Service Provision in SDN-NFV Environment

    Shumaila Shahzadi1, Fahad Ahmad1,*, Asma Basharat1, Madallah Alruwaili2, Saad Alanazi2, Mamoona Humayun2, Muhammad Rizwan1, Shahid Naseem3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2723-2749, 2021, DOI:10.32604/cmc.2021.014594 - 28 December 2020

    Abstract With the rising demand for data access, network service providers face the challenge of growing their capital and operating costs while at the same time enhancing network capacity and meeting the increased demand for access. To increase efficacy of Software Defined Network (SDN) and Network Function Virtualization (NFV) framework, we need to eradicate network security configuration errors that may create vulnerabilities to affect overall efficiency, reduce network performance, and increase maintenance cost. The existing frameworks lack in security, and computer systems face few abnormalities, which prompts the need for different recognition and mitigation methods to… More >

  • Open Access

    ARTICLE

    Functionality Aware Dynamic Composition of Web Services

    Mohemmed Sha*, Abdalla Alameen

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 201-211, 2021, DOI:10.32604/csse.2021.014513 - 23 December 2020

    Abstract The composition of the web service is a common technique to attain the best results of complex web tasks. The selection of appropriate web services, linking those services in the action flow and attaining the actual functionality of the task are the important factors to be considered. Even though different frameworks and methods have been proposed to dynamically compose web services, each method has its advantage and disadvantage over the other. Most of the methods give much importance to the Quality of Service (QoS) but fail to achieve the actual functionality after composition. This paper… More >

  • Open Access

    ARTICLE

    Hybrid Cloud Architecture for Higher Education System

    Omar Nooh Almotiry1, Mohemmed Sha2,*, Mohamudha Parveen Rahamathulla3, Omer Salih Dawood Omer2

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 1-12, 2021, DOI:10.32604/csse.2021.014267 - 23 December 2020

    Abstract As technology improves, several modernization efforts are taken in the process of teaching and learning. An effective education system should maintain global connectivity, federate security and deliver self-access to its services. The cloud computing services transform the current education system to an advanced one. There exist several tools and services to make teaching and learning more interesting. In the higher education system, the data flow and basic operations are almost the same. These systems need to access cloud-based applications and services for their operational advancement and flexibility. Architecting a suitable cloud-based education system will leverage… More >

  • Open Access

    ARTICLE

    A Comprehensive Utility Function for Resource Allocation in Mobile Edge Computing

    Zaiwar Ali1, Sadia Khaf2, Ziaul Haq Abbas2, Ghulam Abbas3, Lei Jiao4, Amna Irshad2, Kyung Sup Kwak5, Muhammad Bilal6,*

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1461-1477, 2021, DOI:10.32604/cmc.2020.013743 - 26 November 2020

    Abstract In mobile edge computing (MEC), one of the important challenges is how much resources of which mobile edge server (MES) should be allocated to which user equipment (UE). The existing resource allocation schemes only consider CPU as the requested resource and assume utility for MESs as either a random variable or dependent on the requested CPU only. This paper presents a novel comprehensive utility function for resource allocation in MEC. The utility function considers the heterogeneous nature of applications that a UE offloads to MES. The proposed utility function considers all important parameters, including CPU,… More >

  • Open Access

    ARTICLE

    University Learning and Anti-Plagiarism Back-End Services

    Manjur Kolhar*, Abdalla Alameen

    CMC-Computers, Materials & Continua, Vol.66, No.2, pp. 1215-1226, 2021, DOI:10.32604/cmc.2020.012658 - 26 November 2020

    Abstract Plagiarism refers to the use of other people’s ideas and information without acknowledging the source. In this research, anti-plagiarism software was designed especially for the university and its campuses to identify plagiarized text in students’ written assignments and laboratory reports. The proposed framework collected original documents to identify plagiarized text using natural language processing. Our research proposes a method to detect plagiarism by applying the core concept of text, which is semantic associations of words and their syntactic composition. Information on the browser was obtained through Request application programming interface by name Url.AbsoluteUri, and it is… More >

  • Open Access

    ARTICLE

    Design and Analysis of a Water Quality Monitoring Data Service Platform

    Jianjun Zhang1,*, Yifu Sheng1, Weida Chen2, Haijun Lin1, Guang Sun3, Peng Guo4

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 389-405, 2021, DOI:10.32604/cmc.2020.012384 - 30 October 2020

    Abstract Water is one of the basic resources for human survival. Water pollution monitoring and protection have been becoming a major problem for many countries all over the world. Most traditional water quality monitoring systems, however, generally focus only on water quality data collection, ignoring data analysis and data mining. In addition, some dirty data and data loss may occur due to power failures or transmission failures, further affecting data analysis and its application. In order to meet these needs, by using Internet of things, cloud computing, and big data technologies, we designed and implemented a… More >

  • Open Access

    ARTICLE

    Traffic Queuing Management in the Internet of Things: An Optimized RED Algorithm Based Approach

    Abdul Waheed1,2,*, Naila Habib Khan3, Mahdi Zareei4, Shahab Ul Islam5, Latif Jan5,6, Arif Iqbal Umar1, Ehab Mahmoud Mohamed7,8

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 359-372, 2021, DOI:10.32604/cmc.2020.012196 - 30 October 2020

    Abstract Congestion control is one of the main obstacles in cyberspace traffic. Overcrowding in internet traffic may cause several problems; such as high packet hold-up, high packet dropping, and low packet output. In the course of data transmission for various applications in the Internet of things, such problems are usually generated relative to the input. To tackle such problems, this paper presents an analytical model using an optimized Random Early Detection (RED) algorithm-based approach for internet traffic management. The validity of the proposed model is checked through extensive simulation-based experiments. An analysis is observed for different More >

  • Open Access

    ARTICLE

    A Smart Wellness Service Platform and Its Practical Implementation

    Umar Farooq1, Intae Ryoo2, Gon Khang1,*

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 45-57, 2021, DOI:10.32604/cmc.2020.013035 - 30 October 2020

    Abstract Advances in the field of medical sciences and medical technology, and present-day challenges, such as an aging population, rising medical expenses, and lifestyle-related diseases, have collectively catalyzed a research ecosystem termed “smart wellness.” This article describes the establishment of a smart wellness service platform designed to empower individuals to create a sense of balance in their lives. Step-by-step details include service model, design, and architectural considerations. As a proof of concept, implementation details of a Health Improvement and Management Systems (HIMS) Hub, a Smart Wellness Service Platform deployed in six cities in South Korea, are More >

  • Open Access

    ARTICLE

    A Database-Driven Algorithm for Building Top-k Service-Based Systems

    Dandan Peng, Le Sun*

    Journal of Quantum Computing, Vol.2, No.4, pp. 171-179, 2020, DOI:10.32604/jqc.2020.015402 - 07 January 2021

    Abstract The purpose of this work aims is to automatically build top-k (the number of suggested results) light weight service based systems (LitSBSs) on the basis of user-given keywords. Compared with our previous work, we use a score (oscore) to evaluate the keyword matching degree and QoS performance of a service so that we could find top-k LitSBSs with both high keyword matching degree and great QoS performance at the same time. In addition, to guarantee the quality of found top-k LitSBSs and improve the time efficiency, we redesign the database-driven algorithm (LitDB). We add the More >

Displaying 281-290 on page 29 of 353. Per Page