Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (97)
  • Open Access

    ARTICLE

    Enhanced Reliability in Network Function Virtualization by Hybrid Hexagon-Cost Efficient Algorithm

    D. Jeyakumar*, C. Rajabhushanam

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1131-1144, 2022, DOI:10.32604/csse.2022.022480 - 09 May 2022

    Abstract In this,communication world, the Network Function Virtualization concept is utilized for many businesses, small services to virtualize the network node function and to build a block that may connect the chain, communication services. Mainly, Virtualized Network Function Forwarding Graph (VNF-FG) has been used to define the connection between the VNF and to give the best end-to-end services. In the existing method, VNF mapping and backup VNF were proposed but there was no profit and reliability improvement of the backup and mapping of the primary VNF. As a consequence, this paper offers a Hybrid Hexagon-Cost Efficient… More >

  • Open Access

    ARTICLE

    Arabic Sentiment Analysis of Users’ Opinions of Governmental Mobile Applications

    Mohammed Hadwan1,2,3,*, Mohammed A. Al-Hagery4, Mohammed Al-Sarem5, Faisal Saeed5,6

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4675-4689, 2022, DOI:10.32604/cmc.2022.027311 - 21 April 2022

    Abstract Different types of pandemics that have appeared from time to time have changed many aspects of daily life. Some governments encourage their citizens to use certain applications to help control the spread of disease and to deliver other services during lockdown. The Saudi government has launched several mobile apps to control the pandemic and have made these apps available through Google Play and the app store. A huge number of reviews are written daily by users to express their opinions, which include significant information to improve these applications. The manual processing and extracting of information… More >

  • Open Access

    ARTICLE

    Dynamic Vehicular Clustering Enhancing Video on Demand Services Over Vehicular Ad-hoc Networks

    M. Almutiq1, L. Sellami1,2,*, B. Alaya1,3

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3493-3510, 2022, DOI:10.32604/cmc.2022.024571 - 29 March 2022

    Abstract Nowadays, video streaming applications are becoming one of the tendencies driving vehicular network users. In this work, considering the unpredictable vehicle density, the unexpected acceleration or deceleration of the different vehicles included in the vehicular traffic load, and the limited radio range of the employed communication scheme, we introduce the “Dynamic Vehicular Clustering” (DVC) algorithm as a new scheme for video streaming systems over vehicular ad-hoc networks (VANET). The proposed algorithm takes advantage of the small cells concept and the introduction of wireless backhauls, inspired by the different features and the performance of the Long… More >

  • Open Access

    ARTICLE

    An Acceptance Model of Using Mobile-Government Services (AMGS)

    Ahmad Althunibat1,*, Mohammad Abdallah1, Mohammed Amin Almaiah2, Nour Alabwaini1, Thamer Ahmad Alrawashdeh1

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.2, pp. 865-880, 2022, DOI:10.32604/cmes.2022.019075 - 14 March 2022

    Abstract In recent years, the telecommunications sector is no longer limited to traditional communications, but has become the backbone for the use of data, content and digital applications by individuals, governments and companies to ensure the continuation of economic and social activity in light of social distancing and total closure in most countries in the world. Therefore, electronic government (e-Government) and mobile government (m-Government) are the results of technological evolution and innovation. Hence, it is important to investigate the factors that influence the intention to use m-Government services among Jordan’s society. This paper proposed a new… More >

  • Open Access

    ARTICLE

    Intelligent Deer Hunting Optimization Based Grid Scheduling Scheme

    Mesfer Al Duhayyim1, Majdy M. Eltahir2, Imène Issaoui3, Fahd N. Al-Wesabi2,4, Anwer Mustafa Hilal5, Fuad Ali Mohammed Al-Yarimi2, Manar Ahmed Hamza5,*, Abu Sarwar Zamani5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 181-195, 2022, DOI:10.32604/cmc.2022.024206 - 24 February 2022

    Abstract The grid environment is a dynamic, heterogeneous, and changeable computing system that distributes various services amongst different clients. To attain the benefits of collaborative resource sharing in Grid computing, a novel and proficient grid resource management system (RMS) is essential. Therefore, detection of an appropriate resource for the presented task is a difficult task. Several scientists have presented algorithms for mapping tasks to the resource. Few of them focus on fault tolerance, user fulfillment, and load balancing. With this motivation, this study designs an intelligent grid scheduling scheme using deer hunting optimization algorithm (DHOA), called More >

  • Open Access

    ARTICLE

    QoS in FANET Business and Swarm Data

    Jesús Hamilton Ortiz1, Carlos Andrés Tavera Romero2,*, Bazil Taha Ahmed3, Osamah Ibrahim Khalaf4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1877-1899, 2022, DOI:10.32604/cmc.2022.023796 - 24 February 2022

    Abstract This article shows the quality of services in a wireless swarm of drones that form an ad hoc network between them Fly Ad Hoc Networks (FANET). Each drone has the ability to send and receive information (like a router); and can behave as a hierarchical node whit the intregration of three protocols: Multiprotocol Label Switch (MPLS), Fast Hierarchical AD Hoc Mobile (FHAM) and Internet Protocol version 6 (IPv6), in conclusion MPLS + FHAM + IPv6. The metrics analyzed in the FANET are: delay, jitter, throughput, lost and sent packets/received. Testing process was carried out with… More >

  • Open Access

    ARTICLE

    Content Feature Extraction-based Hybrid Recommendation for Mobile Application Services

    Chao Ma1,*, Yinggang Sun1, Zhenguo Yang1, Hai Huang1, Dongyang Zhan2,3, Jiaxing Qu4

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 6201-6217, 2022, DOI:10.32604/cmc.2022.022717 - 14 January 2022

    Abstract The number of mobile application services is showing an explosive growth trend, which makes it difficult for users to determine which ones are of interest. Especially, the new mobile application services are emerge continuously, most of them have not be rated when they need to be recommended to users. This is the typical problem of cold start in the field of collaborative filtering recommendation. This problem may makes it difficult for users to locate and acquire the services that they actually want, and the accuracy and novelty of service recommendations are also difficult to satisfy… More >

  • Open Access

    ARTICLE

    Deep Learning Based Intrusion Detection in Cloud Services for Resilience Management

    S. Sreenivasa Chakravarthi1,*, R. Jagadeesh Kannan2, V. Anantha Natarajan3, Xiao-Zhi Gao4

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5117-5133, 2022, DOI:10.32604/cmc.2022.022351 - 14 January 2022

    Abstract In the global scenario one of the important goals for sustainable development in industrial field is innovate new technology, and invest in building infrastructure. All the developed and developing countries focus on building resilient infrastructure and promote sustainable developments by fostering innovation. At this juncture the cloud computing has become an important information and communication technologies model influencing sustainable development of the industries in the developing countries. As part of the innovations happening in the industrial sector, a new concept termed as ‘smart manufacturing’ has emerged, which employs the benefits of emerging technologies like internet… More >

  • Open Access

    ARTICLE

    Efficacy of a Community-Based Trauma Recovery Program after a Fire Disaster

    Yun-Jung Choi1, Mi-Ra Won2, Dong-Hee Cho1,*

    International Journal of Mental Health Promotion, Vol.24, No.1, pp. 85-94, 2022, DOI:10.32604/ijmhp.2022.018017 - 20 December 2021

    Abstract As industries develop, fire disasters and their associated damage are increasing. Investigating the mental health of victims is imperative because this is an essential issue for community recovery after a disaster. This study was conducted to determine the efficacy of a program implemented by a community mental health center based on the investigation of the victims’ depression and post-traumatic stress disorder (PTSD) levels immediately after the disaster and at one-year follow-up. As a result, victims’ depression and PTSD recovered over time, and more changes were confirmed. In particular, the high-risk group for PTSD showed a More >

  • Open Access

    ARTICLE

    Intelligent Model for Predicting the Quality of Services Violation

    Muhammad Adnan Khan1,2, Asma Kanwal3, Sagheer Abbas3, Faheem Khan4, T. Whangbo4,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3607-3619, 2022, DOI:10.32604/cmc.2022.023480 - 07 December 2021

    Abstract Cloud computing is providing IT services to its customer based on Service level agreements (SLAs). It is important for cloud service providers to provide reliable Quality of service (QoS) and to maintain SLAs accountability. Cloud service providers need to predict possible service violations before the emergence of an issue to perform remedial actions for it. Cloud users’ major concerns; the factors for service reliability are based on response time, accessibility, availability, and speed. In this paper, we, therefore, experiment with the parallel mutant-Particle swarm optimization (PSO) for the detection and predictions of QoS violations in More >

Displaying 31-40 on page 4 of 97. Per Page