Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (321)
  • Open Access

    ARTICLE

    Integration of Renewable Energy Sources into the Smart Grid Using Enhanced SCA

    Shaik Karimulla, K. Ravi*

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1557-1572, 2022, DOI:10.32604/iasc.2022.022953 - 09 December 2021

    Abstract The usage of energy in everyday life is growing day by day as a result of the rapid growth in the human population. One solution is to increase electricity generation to the same extent as the human population, but this is usually practically impossible. As the population is increasing, the need for electrical usage is also increasing. Therefore, smart grids play an important role in making efficient use of existing energy sources like solar, wind and battery storage systems. By managing demand, the minimization of power consumption and its consequent costs. On the load side,… More >

  • Open Access

    ARTICLE

    Construction of Key-dependent S-box for Secure Cloud Storage

    A. Indumathi*, G. Sumathi

    Intelligent Automation & Soft Computing, Vol.32, No.3, pp. 1509-1524, 2022, DOI:10.32604/iasc.2022.022743 - 09 December 2021

    Abstract As cloud storage systems have developed and been applied in complex environments, their data security has become more prevalent in recent years. The issue has been approached through many models. Data is encrypted and stored in these models. One of the most widely used encryption methods is the Advanced Encryption Standard (AES). In AES, the Substitution box(S-box) is playing a significant part in imparting the job of confusion. The security of the entire cryptosystem depends on its nonlinearity. In this work, a robust and secure S-box is constructed using a novel method, i.e., fingerprint features-based permutation… More >

  • Open Access

    ARTICLE

    Live Migration of Virtual Machines Using a Mamdani Fuzzy Inference System

    Tahir Alyas1, Iqra Javed1, Abdallah Namoun2, Ali Tufail2, Sami Alshmrany2, Nadia Tabassum3,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3019-3033, 2022, DOI:10.32604/cmc.2022.019836 - 07 December 2021

    Abstract Efforts were exerted to enhance the live virtual machines (VMs) migration, including performance improvements of the live migration of services to the cloud. The VMs empower the cloud users to store relevant data and resources. However, the utilization of servers has increased significantly because of the virtualization of computer systems, leading to a rise in power consumption and storage requirements by data centers, and thereby the running costs. Data center migration technologies are used to reduce risk, minimize downtime, and streamline and accelerate the data center move process. Indeed, several parameters, such as non-network overheads… More >

  • Open Access

    ARTICLE

    Implementation and Validation of the Optimized Deduplication Strategy in Federated Cloud Environment

    Nipun Chhabra*, Manju Bala, Vrajesh Sharma

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 2019-2035, 2022, DOI:10.32604/cmc.2022.021797 - 03 November 2021

    Abstract Cloud computing technology is the culmination of technical advancements in computer networks, hardware and software capabilities that collectively gave rise to computing as a utility. It offers a plethora of utilities to its clients worldwide in a very cost-effective way and this feature is enticing users/companies to migrate their infrastructure to cloud platform. Swayed by its gigantic capacity and easy access clients are uploading replicated data on cloud resulting in an unnecessary crunch of storage in datacenters. Many data compression techniques came to rescue but none could serve the purpose for the capacity as large… More >

  • Open Access

    ARTICLE

    Optimal Data Placement and Replication Approach for SIoT with Edge

    B. Prabhu Shankar1,*, S. Chitra2

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 661-676, 2022, DOI:10.32604/csse.2022.019507 - 25 October 2021

    Abstract Social networks (SNs) are sources with extreme number of users around the world who are all sharing data like images, audio, and video to their friends using IoT devices. This concept is the so-called Social Internet of Things (SIot). The evolving nature of edge-cloud computing has enabled storage of a large volume of data from various sources, and this task demands an efficient storage procedure. For this kind of large volume of data storage, the usage of data replication using edge with geo-distributed cloud service area is suited to fulfill the user’s expectations with low… More >

  • Open Access

    ARTICLE

    Distributed Secure Storage Scheme Based on Sharding Blockchain

    Jin Wang1,2, Chenchen Han1, Xiaofeng Yu3,*, Yongjun Ren4, R. Simon Sherratt5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4485-4502, 2022, DOI:10.32604/cmc.2022.020648 - 11 October 2021

    Abstract Distributed storage can store data in multiple devices or servers to improve data security. However, in today's explosive growth of network data, traditional distributed storage scheme is faced with some severe challenges such as insufficient performance, data tampering, and data lose. A distributed storage scheme based on blockchain has been proposed to improve security and efficiency of traditional distributed storage. Under this scheme, the following improvements have been made in this paper. This paper first analyzes the problems faced by distributed storage. Then proposed to build a new distributed storage blockchain scheme with sharding blockchain.… More >

  • Open Access

    ARTICLE

    Deep Learning Based Modeling of Groundwater Storage Change

    Mohd Anul Haq1,*, Abdul Khadar Jilani1, P. Prabu2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4599-4617, 2022, DOI:10.32604/cmc.2022.020495 - 11 October 2021

    Abstract The understanding of water resource changes and a proper projection of their future availability are necessary elements of sustainable water planning. Monitoring GWS change and future water resource availability are crucial, especially under changing climatic conditions. Traditional methods for in situ groundwater well measurement are a significant challenge due to data unavailability. The present investigation utilized the Long Short Term Memory (LSTM) networks to monitor and forecast Terrestrial Water Storage Change (TWSC) and Ground Water Storage Change (GWSC) based on Gravity Recovery and Climate Experiment (GRACE) datasets from 2003–2025 for five basins of Saudi Arabia. An… More >

  • Open Access

    ARTICLE

    A Novel Big Data Storage Reduction Model for Drill Down Search

    N. Ragavan, C. Yesubai Rubavathi*

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 373-387, 2022, DOI:10.32604/csse.2022.020452 - 08 October 2021

    Abstract Multi-level searching is called Drill down search. Right now, no drill down search feature is available in the existing search engines like Google, Yahoo, Bing and Baidu. Drill down search is very much useful for the end user to find the exact search results among the huge paginated search results. Higher level of drill down search with category based search feature leads to get the most accurate search results but it increases the number and size of the file system. The purpose of this manuscript is to implement a big data storage reduction binary file… More >

  • Open Access

    ARTICLE

    Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography

    N. Niyaz Ahamed*, N. Duraipandian

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 83-94, 2022, DOI:10.32604/csse.2022.020071 - 08 October 2021

    Abstract The tremendous development of cloud computing with related technologies is an unexpected one. However, centralized cloud storage faces few challenges such as latency, storage, and packet drop in the network. Cloud storage gets more attention due to its huge data storage and ensures the security of secret information. Most of the developments in cloud storage have been positive except better cost model and effectiveness, but still data leakage in security are billion-dollar questions to consumers. Traditional data security techniques are usually based on cryptographic methods, but these approaches may not be able to withstand an… More >

  • Open Access

    ARTICLE

    Transcriptome profile analysis of the accompanying migratory parasitic wasp Aenasius bambawalei (= Aenasius arizonensis girault) (Hymenoptera: Encyrtidae): Genes related to fertilization involved at different stage of ovary development

    JUAN ZHANG2, JUN HUANG3, YAYUAN TANG2, XIUZHEN LONG1

    BIOCELL, Vol.46, No.1, pp. 195-205, 2022, DOI:10.32604/biocell.2022.016563 - 28 September 2021

    Abstract Age-related declines in fertilization success have been reported for a wide range of species. The fertilization of parasitic wasps is closely related to egg production and sperm storage. Aenasius bambawalei (Hymenoptera: Encyridae) is a key parasitic wasp of the important invasive mealybug Phenacoccus solenopsis (Hemiptera: Pseudococcidae). The female offspring ratio of this parasitic wasp was declined with parental age in mass rearing under laboratory conditions. To investigate the molecular mechanisms involved in the reproduction of A. bambawalei, an extensive analysis of the impact of age on transcriptome profile of mated ovaries of this wasp was performed by comparing… More >

Displaying 231-240 on page 24 of 321. Per Page