Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (286)
  • Open Access

    ARTICLE

    A Task-Oriented Hybrid Cloud Architecture with Deep Cognition Mechanism for Intelligent Space

    Yongcheng Cui1, Guohui Tian1,*, Xiaochun Cheng2,*

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1385-1408, 2023, DOI:10.32604/cmc.2023.040246

    Abstract Intelligent Space (IS) is widely regarded as a promising paradigm for improving quality of life through using service task processing. As the field matures, various state-of-the-art IS architectures have been proposed. Most of the IS architectures designed for service robots face the problems of fixed-function modules and low scalability when performing service tasks. To this end, we propose a hybrid cloud service robot architecture based on a Service-Oriented Architecture (SOA). Specifically, we first use the distributed deployment of functional modules to solve the problem of high computing resource occupancy. Then, the Socket communication interface layer is designed to improve the… More >

  • Open Access

    ARTICLE

    A Machine Learning-Based Distributed Denial of Service Detection Approach for Early Warning in Internet Exchange Points

    Salem Alhayani*, Diane R. Murphy

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2235-2259, 2023, DOI:10.32604/cmc.2023.038003

    Abstract The Internet service provider (ISP) is the heart of any country’s Internet infrastructure and plays an important role in connecting to the World Wide Web. Internet exchange point (IXP) allows the interconnection of two or more separate network infrastructures. All Internet traffic entering a country should pass through its IXP. Thus, it is an ideal location for performing malicious traffic analysis. Distributed denial of service (DDoS) attacks are becoming a more serious daily threat. Malicious actors in DDoS attacks control numerous infected machines known as botnets. Botnets are used to send numerous fake requests to overwhelm the resources of victims… More >

  • Open Access

    ARTICLE

    Edge Cloud Selection in Mobile Edge Computing (MEC)-Aided Applications for Industrial Internet of Things (IIoT) Services

    Dae-Young Kim1, SoYeon Lee2, MinSeung Kim2, Seokhoon Kim1,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2049-2060, 2023, DOI:10.32604/csse.2023.040473

    Abstract In many IIoT architectures, various devices connect to the edge cloud via gateway systems. For data processing, numerous data are delivered to the edge cloud. Delivering data to an appropriate edge cloud is critical to improve IIoT service efficiency. There are two types of costs for this kind of IoT network: a communication cost and a computing cost. For service efficiency, the communication cost of data transmission should be minimized, and the computing cost in the edge cloud should be also minimized. Therefore, in this paper, the communication cost for data transmission is defined as the delay factor, and the… More >

  • Open Access

    ARTICLE

    Toward Secure Software-Defined Networks Using Machine Learning: A Review, Research Challenges, and Future Directions

    Muhammad Waqas Nadeem1,*, Hock Guan Goh1, Yichiet Aun1, Vasaki Ponnusamy2

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2201-2217, 2023, DOI:10.32604/csse.2023.039893

    Abstract Over the past few years, rapid advancements in the internet and communication technologies have led to increasingly intricate and diverse networking systems. As a result, greater intelligence is necessary to effectively manage, optimize, and maintain these systems. Due to their distributed nature, machine learning models are challenging to deploy in traditional networks. However, Software-Defined Networking (SDN) presents an opportunity to integrate intelligence into networks by offering a programmable architecture that separates data and control planes. SDN provides a centralized network view and allows for dynamic updates of flow rules and software-based traffic analysis. While the programmable nature of SDN makes… More >

  • Open Access

    REVIEW

    Quality of Experience in Internet of Things: A Systematic Literature Review

    Rawan Sanyour*, Manal Abdullah, Salha Abdullah

    Journal on Internet of Things, Vol.4, No.4, pp. 263-282, 2022, DOI:10.32604/jiot.2022.040966

    Abstract With the rapid growth of the Internet of Things paradigm, a tremendous number of applications and services that require minimal or no human involvement have been developed to enhance the quality of everyday life in various domains. In order to ensure that such services provide their functionalities with the expected quality, it is essential to measure and evaluate this quality, which can be in some cases a challenging task due to the lack of human intervention and feedback. Recently, the vast majority of the Quality of Experience QoE works mainly address the multimedia services. However, the introduction of Internet of… More >

  • Open Access

    ARTICLE

    The Management of Mental Health, and Service Networks in Italy

    Silvia Carbone*

    International Journal of Mental Health Promotion, Vol.25, No.8, pp. 927-935, 2023, DOI:10.32604/ijmhp.2023.027784

    Abstract Madness has attracted and frightened for centuries, and talking about this means discussing how this diversity was built and managed in different social contexts and historical periods. Not all societies have had, and still have, the same relationship with madness. It is only with the affirmation of the Modern State, and of Capitalism, that the idea of “normality” indispensable to be able to conceive diversity as something dangerously distant and different from the norm takes over. In our post-modern society, people with mental illness in Italy can resort to specialists and social-health services. But the heterogeneous answers given after the… More > Graphic Abstract

    The Management of Mental Health, and Service Networks in Italy

  • Open Access

    ARTICLE

    Real-Time Multi Fractal Trust Evaluation Model for Efficient Intrusion Detection in Cloud

    S. Priya1, R. S. Ponmagal2,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1895-1907, 2023, DOI:10.32604/iasc.2023.039814

    Abstract Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks. To address such threats towards cloud services, numerous techniques exist that mitigate the service threats according to different metrics. The rule-based approaches are unsuitable for new threats, whereas trust-based systems estimate trust value based on behavior, flow, and other features. However, the methods suffer from mitigating intrusion attacks at a higher rate. This article presents a novel Multi Fractal Trust Evaluation Model (MFTEM) to overcome these deficiencies. The method involves analyzing service growth,… More >

  • Open Access

    ARTICLE

    Performance Assessment and Configuration Analysis in the Study of SCADA System (Supervisory Control and Data Acquisition)

    R. Vanalakshmi1, S. Maragathasundari1,*, M. Kameswari1, B. Balamurugan2, C. Swedheetha3

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1399-1419, 2023, DOI:10.32604/iasc.2023.038506

    Abstract Queuing models are used to assess the functionality and aesthetics of SCADA systems for supervisory control and data collection. Here, the main emphasis is on how the queuing theory can be used in the system’s design and analysis. The analysis’s findings indicate that by using queuing models, cost-performance ratios close to the ideal might be attained. This article discusses a novel methodology for evaluating the service-oriented survivability of SCADA systems. In order to evaluate the state of service performance and the system’s overall resilience, the framework applies queuing theory to an analytical model. As a result, the SCADA process is… More >

  • Open Access

    ARTICLE

    QoS-Aware Cloud Service Optimization Algorithm in Cloud Manufacturing Environment

    Wenlong Ma1,2,*, Youhong Xu1, Jianwei Zheng2, Sadaqat ur Rehman3

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1499-1512, 2023, DOI:10.32604/iasc.2023.030484

    Abstract In a cloud manufacturing environment with abundant functionally equivalent cloud services, users naturally desire the highest-quality service(s). Thus, a comprehensive measurement of quality of service (QoS) is needed. Optimizing the plethora of cloud services has thus become a top priority. Cloud service optimization is negatively affected by untrusted QoS data, which are inevitably provided by some users. To resolve these problems, this paper proposes a QoS-aware cloud service optimization model and establishes QoS-information awareness and quantification mechanisms. Untrusted data are assessed by an information correction method. The weights discovered by the variable precision Rough Set, which mined the evaluation indicators… More >

  • Open Access

    ARTICLE

    Survey of Resources Allocation Techniques with a Quality of Service (QoS) Aware in a Fog Computing Environment

    Wan Norsyafizan W. Muhamad1, Kaharudin Dimyati2, Muhammad Awais Javed3, Suzi Seroja Sarnin1,*, Divine Senanu Ametefe1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1291-1308, 2023, DOI:10.32604/cmc.2023.037214

    Abstract The tremendous advancement in distributed computing and Internet of Things (IoT) applications has resulted in the adoption of fog computing as today’s widely used framework complementing cloud computing. Thus, suitable and effective applications could be performed to satisfy the applications’ latency requirement. Resource allocation techniques are essential aspects of fog networks which prevent unbalanced load distribution. Effective resource management techniques can improve the quality of service metrics. Due to the limited and heterogeneous resources available within the fog infrastructure, the fog layer’s resources need to be optimised to efficiently manage and distribute them to different applications within the IoT network.… More >

Displaying 21-30 on page 3 of 286. Per Page