Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (288)
  • Open Access

    ARTICLE

    Auto-Scaling Framework for Enhancing the Quality of Service in the Mobile Cloud Environments

    Yogesh Kumar1,*, Jitender Kumar1, Poonam Sheoran2

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5785-5800, 2023, DOI:10.32604/cmc.2023.039276

    Abstract On-demand availability and resource elasticity features of Cloud computing have attracted the focus of various research domains. Mobile cloud computing is one of these domains where complex computation tasks are offloaded to the cloud resources to augment mobile devices’ cognitive capacity. However, the flexible provisioning of cloud resources is hindered by uncertain offloading workloads and significant setup time of cloud virtual machines (VMs). Furthermore, any delays at the cloud end would further aggravate the miseries of real-time tasks. To resolve these issues, this paper proposes an auto-scaling framework (ACF) that strives to maintain the quality of service (QoS) for the… More >

  • Open Access

    ARTICLE

    Delivery Service Management System Using Google Maps for SMEs in Emerging Countries

    Sophea Horng, Pisal Yenradee*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6119-6143, 2023, DOI:10.32604/cmc.2023.038764

    Abstract This paper proposes a Delivery Service Management (DSM) system for Small and Medium Enterprises (SMEs) that own a delivery fleet of pickup trucks to manage Business-to-Business (B2B) delivery services. The proposed DSM system integrates four systems: Delivery Location Positioning (DLP), Delivery Route Planning (DRP), Arrival Time Prediction (ATP), and Communication and Data Sharing (CDS) systems. These systems are used to pinpoint the delivery locations of customers, plan the delivery route of each truck, predict arrival time (with an interval) at each delivery location, and communicate and share information among stakeholders, respectively. The DSM system deploys Google applications, a GPS tracking… More >

  • Open Access

    ARTICLE

    Two-Way Approach for Improved Real-Time Transmission in Fog-IoT-Based Health Monitoring System for Critical Patients

    Abeera Ilyas1,*, Saeed Mahfooz1, Zahid Mehmood2,3, Gauhar Ali4, Muhammad ElAffendi4

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3815-3829, 2023, DOI:10.32604/csse.2023.036316

    Abstract Health monitoring systems are now required, particularly for essential patients, following the COVID-19 pandemic, which was followed by its variants and other epidemics of a similar nature. Effective procedures and strategies are required, though, to react promptly to the enormous volume of real-time data offered by monitoring equipment. Although fog-based designs for IoT health systems typically result in enhanced services, they also give rise to issues that need to be resolved. In this paper, we propose a two-way strategy to reduce network latency and use while increasing real-time data transmission of device gateways used for sensors by making educated judgments… More >

  • Open Access

    ARTICLE

    Energy Based Random Repeat Trust Computation in Delay Tolerant Network

    S. Dheenathayalan*, B. Paramasivan

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 2845-2859, 2023, DOI:10.32604/csse.2023.033326

    Abstract As the use of mobile devices continues to rise, trust administration will significantly improve security in routing the guaranteed quality of service (QoS) supply in Mobile Ad Hoc Networks (MANET) due to the mobility of the nodes. There is no continuance of network communication between nodes in a delay-tolerant network (DTN). DTN is designed to complete recurring connections between nodes. This approach proposes a dynamic source routing protocol (DSR) based on a feed-forward neural network (FFNN) and energy-based random repetition trust calculation in DTN. If another node is looking for a node that swerved off of its path in this… More >

  • Open Access

    ARTICLE

    Hybrid Energy Systems and the Logic of Their Service-Dominant Implementation: Screening the Pathway to Improve Results

    Halyna Bielokha1, Leonora Chupryna2, Sergey Denisyuk1, Tatiana Eutukhova3, Oleksandr Novoseltsev2,*

    Energy Engineering, Vol.120, No.6, pp. 1307-1323, 2023, DOI:10.32604/ee.2023.025863

    Abstract The transition of the global economy to a low-carbon development path has led to dramatic changes in the organization and functioning of energy markets around the world, where hybrid energy systems (HESs) are one of the decisive active agents. At the same time, a number of problems facing the modern HESs are primarily due to the stochastic nature of the renewable energy they use, require further profound changes not only in the technologies they use and how they manage them, necessary to meet the needs of end consumers and interact with the unified energy system, but also to preserve the… More >

  • Open Access

    ARTICLE

    Data Center Traffic Scheduling Strategy for Minimization Congestion and Quality of Service Guaranteeing

    Chunzhi Wang, Weidong Cao*, Yalin Hu, Jinhang Liu

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4377-4393, 2023, DOI:10.32604/cmc.2023.037625

    Abstract According to Cisco’s Internet Report 2020 white paper, there will be 29.3 billion connected devices worldwide by 2023, up from 18.4 billion in 2018. 5G connections will generate nearly three times more traffic than 4G connections. While bringing a boom to the network, it also presents unprecedented challenges in terms of flow forwarding decisions. The path assignment mechanism used in traditional traffic scheduling methods tends to cause local network congestion caused by the concentration of elephant flows, resulting in unbalanced network load and degraded quality of service. Using the centralized control of software-defined networks, this study proposes a data center… More >

  • Open Access

    ARTICLE

    DDoS Attack Detection in Cloud Computing Based on Ensemble Feature Selection and Deep Learning

    Yousef Sanjalawe1,2,*, Turke Althobaiti3,4

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 3571-3588, 2023, DOI:10.32604/cmc.2023.037386

    Abstract Intrusion Detection System (IDS) in the cloud Computing (CC) environment has received paramount interest over the last few years. Among the latest approaches, Deep Learning (DL)-based IDS methods allow the discovery of attacks with the highest performance. In the CC environment, Distributed Denial of Service (DDoS) attacks are widespread. The cloud services will be rendered unavailable to legitimate end-users as a consequence of the overwhelming network traffic, resulting in financial losses. Although various researchers have proposed many detection techniques, there are possible obstacles in terms of detection performance due to the use of insignificant traffic features. Therefore, in this paper,… More >

  • Open Access

    ARTICLE

    A Proposed Architecture for Local-Host and AWS with Multiagent System

    Jaspreet Chawla1,*, Anil Kr Ahlawat2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2787-2802, 2023, DOI:10.32604/iasc.2023.034775

    Abstract Cloud computing has become one of the leading technologies in the world today. The benefits of cloud computing affect end users directly. There are several cloud computing frameworks, and each has ways of monitoring and providing resources. Cloud computing eliminates customer requirements such as expensive system configuration and massive infrastructure while improving dependability and scalability. From the user’s perspective, cloud computing makes it easy to upload multiagents and operate on different web services. In this paper, the authors used a restful web service and an agent system to discuss, deployments, and analysis of load performance parameters like memory use, central… More >

  • Open Access

    ARTICLE

    Hybridizing Artificial Bee Colony with Bat Algorithm for Web Service Composition

    Tariq Ahamed Ahanger1,*, Fadl Dahan2,3, Usman Tariq1

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2429-2445, 2023, DOI:10.32604/csse.2023.037692

    Abstract In the Internet of Things (IoT), the users have complex needs, and the Web Service Composition (WSC) was introduced to address these needs. The WSC’s main objective is to search for the optimal combination of web services in response to the user needs and the level of Quality of Services (QoS) constraints. The challenge of this problem is the huge number of web services that achieve similar functionality with different levels of QoS constraints. In this paper, we introduce an extension of our previous works on the Artificial Bee Colony (ABC) and Bat Algorithm (BA). A new hybrid algorithm was… More >

  • Open Access

    ARTICLE

    ILSM: Incorporated Lightweight Security Model for Improving QOS in WSN

    Ansar Munir Shah1, Mohammed Aljubayri2, Muhammad Faheem Khan1, Jarallah Alqahtani2,*, Mahmood ul Hassan3, Adel Sulaiman2, Asadullah Shaikh2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2471-2488, 2023, DOI:10.32604/csse.2023.034951

    Abstract In the network field, Wireless Sensor Networks (WSN) contain prolonged attention due to afresh augmentations. Industries like health care, traffic, defense, and many more systems espoused the WSN. These networks contain tiny sensor nodes containing embedded processors, Tiny OS, memory, and power source. Sensor nodes are responsible for forwarding the data packets. To manage all these components, there is a need to select appropriate parameters which control the quality of service of WSN. Multiple sensor nodes are involved in transmitting vital information, and there is a need for secure and efficient routing to reach the quality of service. But due… More >

Displaying 41-50 on page 5 of 288. Per Page