Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24)
  • Open Access

    ARTICLE

    Information Centric Networking Based Cooperative Caching Framework for 5G Communication Systems

    R. Mahaveerakannan1, Thanarajan Tamilvizhi2,*, Sonia Jenifer Rayen3, Osamah Ibrahim Khalaf4, Habib Hamam5,6,7,8

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3945-3966, 2024, DOI:10.32604/cmc.2024.051611 - 12 September 2024

    Abstract The demands on conventional communication networks are increasing rapidly because of the exponential expansion of connected multimedia content. In light of the data-centric aspect of contemporary communication, the information-centric network (ICN) paradigm offers hope for a solution by emphasizing content retrieval by name instead of location. If 5G networks are to meet the expected data demand surge from expanded connectivity and Internet of Things (IoT) devices, then effective caching solutions will be required to maximize network throughput and minimize the use of resources. Hence, an ICN-based Cooperative Caching (ICN-CoC) technique has been used to select… More >

  • Open Access

    REVIEW

    Caching Strategies in NDN Based Wireless Ad Hoc Network: A Survey

    Ahmed Khalid1, Rana Asif Rehman1, Byung-Seo Kim2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 61-103, 2024, DOI:10.32604/cmc.2024.049981 - 18 July 2024

    Abstract Wireless Ad Hoc Networks consist of devices that are wirelessly connected. Mobile Ad Hoc Networks (MANETs), Internet of Things (IoT), and Vehicular Ad Hoc Networks (VANETs) are the main domains of wireless ad hoc network. Internet is used in wireless ad hoc network. Internet is based on Transmission Control Protocol (TCP)/Internet Protocol (IP) network where clients and servers interact with each other with the help of IP in a pre-defined environment. Internet fetches data from a fixed location. Data redundancy, mobility, and location dependency are the main issues of the IP network paradigm. All these… More >

  • Open Access

    ARTICLE

    Proactive Caching at the Wireless Edge: A Novel Predictive User Popularity-Aware Approach

    Yunye Wan1, Peng Chen2, Yunni Xia1,*, Yong Ma3, Dongge Zhu4, Xu Wang5, Hui Liu6, Weiling Li7, Xianhua Niu2, Lei Xu8, Yumin Dong9

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.2, pp. 1997-2017, 2024, DOI:10.32604/cmes.2024.048723 - 20 May 2024

    Abstract Mobile Edge Computing (MEC) is a promising technology that provides on-demand computing and efficient storage services as close to end users as possible. In an MEC environment, servers are deployed closer to mobile terminals to exploit storage infrastructure, improve content delivery efficiency, and enhance user experience. However, due to the limited capacity of edge servers, it remains a significant challenge to meet the changing, time-varying, and customized needs for highly diversified content of users. Recently, techniques for caching content at the edge are becoming popular for addressing the above challenges. It is capable of filling… More >

  • Open Access

    ARTICLE

    A Fault-Tolerant Mobility-Aware Caching Method in Edge Computing

    Yong Ma1, Han Zhao2, Kunyin Guo3,*, Yunni Xia3,*, Xu Wang4, Xianhua Niu5, Dongge Zhu6, Yumin Dong7

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 907-927, 2024, DOI:10.32604/cmes.2024.048759 - 16 April 2024

    Abstract Mobile Edge Computing (MEC) is a technology designed for the on-demand provisioning of computing and storage services, strategically positioned close to users. In the MEC environment, frequently accessed content can be deployed and cached on edge servers to optimize the efficiency of content delivery, ultimately enhancing the quality of the user experience. However, due to the typical placement of edge devices and nodes at the network’s periphery, these components may face various potential fault tolerance challenges, including network instability, device failures, and resource constraints. Considering the dynamic nature of MEC, making high-quality content caching decisions… More >

  • Open Access

    ARTICLE

    Towards Cache-Assisted Hierarchical Detection for Real-Time Health Data Monitoring in IoHT

    Muhammad Tahir1,2,*, Mingchu Li1,2, Irfan Khan1,2, Salman A. Al Qahtani3, Rubia Fatima4, Javed Ali Khan5, Muhammad Shahid Anwar6

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2529-2544, 2023, DOI:10.32604/cmc.2023.042403 - 29 November 2023

    Abstract Real-time health data monitoring is pivotal for bolstering road services’ safety, intelligence, and efficiency within the Internet of Health Things (IoHT) framework. Yet, delays in data retrieval can markedly hinder the efficacy of big data awareness detection systems. We advocate for a collaborative caching approach involving edge devices and cloud networks to combat this. This strategy is devised to streamline the data retrieval path, subsequently diminishing network strain. Crafting an adept cache processing scheme poses its own set of challenges, especially given the transient nature of monitoring data and the imperative for swift data transmission,… More >

  • Open Access

    ARTICLE

    A Machine Learning-Based Attack Detection and Prevention System in Vehicular Named Data Networking

    Arif Hussain Magsi1,*, Ali Ghulam2, Saifullah Memon1, Khalid Javeed3, Musaed Alhussein4, Imad Rida5

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1445-1465, 2023, DOI:10.32604/cmc.2023.040290 - 29 November 2023

    Abstract Named Data Networking (NDN) is gaining a significant attention in Vehicular Ad-hoc Networks (VANET) due to its in-network content caching, name-based routing, and mobility-supporting characteristics. Nevertheless, existing NDN faces three significant challenges, including security, privacy, and routing. In particular, security attacks, such as Content Poisoning Attacks (CPA), can jeopardize legitimate vehicles with malicious content. For instance, attacker host vehicles can serve consumers with invalid information, which has dire consequences, including road accidents. In such a situation, trust in the content-providing vehicles brings a new challenge. On the other hand, ensuring privacy and preventing unauthorized access… More >

  • Open Access

    ARTICLE

    A Hybrid Heuristic Service Caching and Task Offloading Method for Mobile Edge Computing

    Yongxuan Sang, Jiangpo Wei*, Zhifeng Zhang, Bo Wang

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2483-2502, 2023, DOI:10.32604/cmc.2023.040485 - 30 August 2023

    Abstract Computing-intensive and latency-sensitive user requests pose significant challenges to traditional cloud computing. In response to these challenges, mobile edge computing (MEC) has emerged as a new paradigm that extends the computational, caching, and communication capabilities of cloud computing. By caching certain services on edge nodes, computational support can be provided for requests that are offloaded to the edges. However, previous studies on task offloading have generally not considered the impact of caching mechanisms and the cache space occupied by services. This oversight can lead to problems, such as high delays in task executions and invalidation… More >

  • Open Access

    ARTICLE

    Redundant Transmission Control Algorithm for Information-Centric Vehicular IoT Networks

    Abdur Rashid Sangi1,*, Satish Anamalamudi2, Mohammed S. Alkatheiri3, Murali Krishna Enduri2, Anil Carie2, Mohammed A. Alqarni4

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 2217-2234, 2023, DOI:10.32604/cmc.2023.038305 - 30 August 2023

    Abstract Vehicular Adhoc Networks (VANETs) enable vehicles to act as mobile nodes that can fetch, share, and disseminate information about vehicle safety, emergency events, warning messages, and passenger infotainment. However, the continuous dissemination of information from vehicles and their one-hop neighbor nodes, Road Side Units (RSUs), and VANET infrastructures can lead to performance degradation of VANETs in the existing host-centric IP-based network. Therefore, Information Centric Networks (ICN) are being explored as an alternative architecture for vehicular communication to achieve robust content distribution in highly mobile, dynamic, and error-prone domains. In ICN-based Vehicular-IoT networks, consumer mobility is… More >

  • Open Access

    ARTICLE

    A Hierarchal Clustered Based Proactive Caching in NDN-Based Vehicular Network

    Muhammad Yasir Khan1, Muhammad Adnan1,2, Jawaid Iqbal3, Noor ul Amin1, Byeong-Hee Roh4, Jehad Ali4,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1185-1208, 2023, DOI:10.32604/csse.2023.039352 - 26 May 2023

    Abstract An Information-Centric Network (ICN) provides a promising paradigm for the upcoming internet architecture, which will struggle with steady growth in data and changes in access models. Various ICN architectures have been designed, including Named Data Networking (NDN), which is designed around content delivery instead of hosts. As data is the central part of the network. Therefore, NDN was developed to get rid of the dependency on IP addresses and provide content effectively. Mobility is one of the major research dimensions for this upcoming internet architecture. Some research has been carried out to solve the mobility… More >

  • Open Access

    ARTICLE

    An Efficient Memory Management for Mobile Operating Systems Based on Prediction of Relaunch Distance

    Jaehwan Lee1, Sangoh Park2,*

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 171-186, 2023, DOI:10.32604/csse.2023.038139 - 26 May 2023

    Abstract Recently, various mobile apps have included more features to improve user convenience. Mobile operating systems load as many apps into memory for faster app launching and execution. The least recently used (LRU)-based termination of cached apps is a widely adopted approach when free space of the main memory is running low. However, the LRU-based cached app termination does not distinguish between frequently or infrequently used apps. The app launch performance degrades if LRU terminates frequently used apps. Recent studies have suggested the potential of using users’ app usage patterns to predict the next app launch… More >

Displaying 1-10 on page 1 of 24. Per Page