Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (92)
  • Open Access

    ARTICLE

    A Process Oriented Integration Model for Smart Health Services

    Farzana Kausar Gondal1,*, Syed Khuram Shahzad2, Muhammad Arfan Jaffar3, Muhammad Waseem Iqbal4

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1369-1386, 2023, DOI:10.32604/iasc.2023.028407

    Abstract Cities are facing challenges of high rise in population number and consequently need to be equipped with latest smart services to provide luxuries of life to its residents. Smart integrated solutions are also a need to deal with the social and environmental challenges, caused by increasing urbanization. Currently, the development of smart services’ integrated network, within a city, is facing the barriers including; less efficient collection and sharing of data, along with inadequate collaboration of software and hardware. Aiming to resolve these issues, this paper recommended a solution for a synchronous functionality in the smart… More >

  • Open Access

    ARTICLE

    WOA-DNN for Intelligent Intrusion Detection and Classification in MANET Services

    C. Edwin Singh1,*, S. Maria Celestin Vigila2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1737-1751, 2023, DOI:10.32604/iasc.2023.028022

    Abstract Mobile ad-hoc networks (MANET) are garnering a lot of attention because of their potential to provide low-cost solutions to real-world communications. MANETs are more vulnerable to security threats. Changes in nodes, bandwidth limits, and centralized control and management are some of the characteristics. IDS (Intrusion Detection System) are the aid for detection, determination, and identification of illegal system activity such as use, copying, modification, and destruction of data. To address the identified issues, academics have begun to concentrate on building IDS-based machine learning algorithms. Deep learning is a type of machine learning that can produce… More >

  • Open Access

    ARTICLE

    Intelligent Resource Allocations for Software-Defined Mission-Critical IoT Services

    Chaebeen Nam1, Sa Math1, Prohim Tam1, Seokhoon Kim1,2,*

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 4087-4102, 2022, DOI:10.32604/cmc.2022.030575

    Abstract Heterogeneous Internet of Things (IoT) applications generate a diversity of novelty applications and services in next-generation networks (NGN), which is essential to guarantee end-to-end (E2E) communication resources for both control plane (CP) and data plane (DP). Likewise, the heterogeneous 5th generation (5G) communication applications, including Mobile Broadband Communications (MBBC), massive Machine-Type Commutation (mMTC), and ultra-reliable low latency communications (URLLC), obligate to perform intelligent Quality-of-Service (QoS) Class Identifier (QCI), while the CP entities will be suffered from the complicated massive HIOT applications. Moreover, the existing management and orchestration (MANO) models are inappropriate for resource utilization and… More >

  • Open Access

    ARTICLE

    Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing

    Abdul Saboor1,*, Mohd Fadzil Hassan2, Rehan Akbar1, Erwin Susanto3, Syed Nasir Mehmood Shah4, Muhammad Aadil Siddiqui5, Saeed Ahmed Magsi5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2223-2239, 2022, DOI:10.32604/cmc.2022.028382

    Abstract Cloud computing has gained significant use over the last decade due to its several benefits, including cost savings associated with setup, deployments, delivery, physical resource sharing across virtual machines, and availability of on-demand cloud services. However, in addition to usual threats in almost every computing environment, cloud computing has also introduced a set of new threats as consumers share physical resources due to the physical co-location paradigm. Furthermore, since there are a growing number of attacks directed at cloud environments (including dictionary attacks, replay code attacks, denial of service attacks, rootkit attacks, code injection attacks,… More >

  • Open Access

    ARTICLE

    Intelligent Deep Learning Enabled Human Activity Recognition for Improved Medical Services

    E. Dhiravidachelvi1, M.Suresh Kumar2, L. D. Vijay Anand3, D. Pritima4, Seifedine Kadry5, Byeong-Gwon Kang6, Yunyoung Nam7,*

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 961-977, 2023, DOI:10.32604/csse.2023.024612

    Abstract Human Activity Recognition (HAR) has been made simple in recent years, thanks to recent advancements made in Artificial Intelligence (AI) techniques. These techniques are applied in several areas like security, surveillance, healthcare, human-robot interaction, and entertainment. Since wearable sensor-based HAR system includes in-built sensors, human activities can be categorized based on sensor values. Further, it can also be employed in other applications such as gait diagnosis, observation of children/adult’s cognitive nature, stroke-patient hospital direction, Epilepsy and Parkinson’s disease examination, etc. Recently-developed Artificial Intelligence (AI) techniques, especially Deep Learning (DL) models can be deployed to accomplish… More >

  • Open Access

    ARTICLE

    QL-CBR Hybrid Approach for Adapting Context-Aware Services

    Somia Belaidouni1,2, Moeiz Miraoui3,4,*, Chakib Tadj1

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1085-1098, 2022, DOI:10.32604/csse.2022.024056

    Abstract A context-aware service in a smart environment aims to supply services according to user situational information, which changes dynamically. Most existing context-aware systems provide context-aware services based on supervised algorithms. Reinforcement algorithms are another type of machine-learning algorithm that have been shown to be useful in dynamic environments through trial-and-error interactions. They also have the ability to build excellent self-adaptive systems. In this study, we aim to incorporate reinforcement algorithms (Q-learning) into a context-aware system to provide relevant services based on a user’s dynamic context. To accelerate the convergence of reinforcement learning (RL) algorithms and More >

  • Open Access

    ARTICLE

    Enhanced Reliability in Network Function Virtualization by Hybrid Hexagon-Cost Efficient Algorithm

    D. Jeyakumar*, C. Rajabhushanam

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1131-1144, 2022, DOI:10.32604/csse.2022.022480

    Abstract In this,communication world, the Network Function Virtualization concept is utilized for many businesses, small services to virtualize the network node function and to build a block that may connect the chain, communication services. Mainly, Virtualized Network Function Forwarding Graph (VNF-FG) has been used to define the connection between the VNF and to give the best end-to-end services. In the existing method, VNF mapping and backup VNF were proposed but there was no profit and reliability improvement of the backup and mapping of the primary VNF. As a consequence, this paper offers a Hybrid Hexagon-Cost Efficient… More >

  • Open Access

    ARTICLE

    Arabic Sentiment Analysis of Users’ Opinions of Governmental Mobile Applications

    Mohammed Hadwan1,2,3,*, Mohammed A. Al-Hagery4, Mohammed Al-Sarem5, Faisal Saeed5,6

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4675-4689, 2022, DOI:10.32604/cmc.2022.027311

    Abstract Different types of pandemics that have appeared from time to time have changed many aspects of daily life. Some governments encourage their citizens to use certain applications to help control the spread of disease and to deliver other services during lockdown. The Saudi government has launched several mobile apps to control the pandemic and have made these apps available through Google Play and the app store. A huge number of reviews are written daily by users to express their opinions, which include significant information to improve these applications. The manual processing and extracting of information… More >

  • Open Access

    ARTICLE

    Dynamic Vehicular Clustering Enhancing Video on Demand Services Over Vehicular Ad-hoc Networks

    M. Almutiq1, L. Sellami1,2,*, B. Alaya1,3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3493-3510, 2022, DOI:10.32604/cmc.2022.024571

    Abstract Nowadays, video streaming applications are becoming one of the tendencies driving vehicular network users. In this work, considering the unpredictable vehicle density, the unexpected acceleration or deceleration of the different vehicles included in the vehicular traffic load, and the limited radio range of the employed communication scheme, we introduce the “Dynamic Vehicular Clustering” (DVC) algorithm as a new scheme for video streaming systems over vehicular ad-hoc networks (VANET). The proposed algorithm takes advantage of the small cells concept and the introduction of wireless backhauls, inspired by the different features and the performance of the Long… More >

  • Open Access

    ARTICLE

    An Acceptance Model of Using Mobile-Government Services (AMGS)

    Ahmad Althunibat1,*, Mohammad Abdallah1, Mohammed Amin Almaiah2, Nour Alabwaini1, Thamer Ahmad Alrawashdeh1

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.2, pp. 865-880, 2022, DOI:10.32604/cmes.2022.019075

    Abstract In recent years, the telecommunications sector is no longer limited to traditional communications, but has become the backbone for the use of data, content and digital applications by individuals, governments and companies to ensure the continuation of economic and social activity in light of social distancing and total closure in most countries in the world. Therefore, electronic government (e-Government) and mobile government (m-Government) are the results of technological evolution and innovation. Hence, it is important to investigate the factors that influence the intention to use m-Government services among Jordan’s society. This paper proposed a new… More >

Displaying 21-30 on page 3 of 92. Per Page