Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (456)
  • Open Access

    ARTICLE

    Enhancing Septic Shock Detection through Interpretable Machine Learning

    Md Mahfuzur Rahman1,*, Md Solaiman Chowdhury2, Mohammad Shorfuzzaman3, Lutful Karim4, Md Shafiullah5, Farag Azzedin1

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.3, pp. 2501-2525, 2024, DOI:10.32604/cmes.2024.055065 - 31 October 2024

    Abstract This article presents an innovative approach that leverages interpretable machine learning models and cloud computing to accelerate the detection of septic shock by analyzing electronic health data. Unlike traditional methods, which often lack transparency in decision-making, our approach focuses on early detection, offering a proactive strategy to mitigate the risks of sepsis. By integrating advanced machine learning algorithms with interpretability techniques, our method not only provides accurate predictions but also offers clear insights into the factors influencing the model’s decisions. Moreover, we introduce a preference-based matching algorithm to evaluate disease severity, enabling timely interventions guided… More >

  • Open Access

    ARTICLE

    NCCMF: Non-Collaborative Continuous Monitoring Framework for Container-Based Cloud Runtime Status

    Tao Zheng1, Wenyi Tang1,2,4,*, Xingshu Chen1,3,4, Changxiang Shen1,3,4

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1687-1701, 2024, DOI:10.32604/cmc.2024.056141 - 15 October 2024

    Abstract The security performance of cloud services is a key factor influencing users’ selection of Cloud Service Providers (CSPs). Continuous monitoring of the security status of cloud services is critical. However, existing research lacks a practical framework for such ongoing monitoring. To address this gap, this paper proposes the first Non-Collaborative Container-Based Cloud Service Operation State Continuous Monitoring Framework (NCCMF), based on relevant standards. NCCMF operates without the CSP’s collaboration by: 1) establishing a scalable supervisory index system through the identification of security responsibilities for each role, and 2) designing a Continuous Metrics Supervision Protocol (CMA) More >

  • Open Access

    ARTICLE

    Efficient and Cost-Effective Vehicle Detection in Foggy Weather for Edge/Fog-Enabled Traffic Surveillance and Collision Avoidance Systems

    Naeem Raza1, Muhammad Asif Habib1, Mudassar Ahmad1, Qaisar Abbas2,*, Mutlaq B. Aldajani2, Muhammad Ahsan Latif3

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 911-931, 2024, DOI:10.32604/cmc.2024.055049 - 15 October 2024

    Abstract Vision-based vehicle detection in adverse weather conditions such as fog, haze, and mist is a challenging research area in the fields of autonomous vehicles, collision avoidance, and Internet of Things (IoT)-enabled edge/fog computing traffic surveillance and monitoring systems. Efficient and cost-effective vehicle detection at high accuracy and speed in foggy weather is essential to avoiding road traffic collisions in real-time. To evaluate vision-based vehicle detection performance in foggy weather conditions, state-of-the-art Vehicle Detection in Adverse Weather Nature (DAWN) and Foggy Driving (FD) datasets are self-annotated using the YOLO LABEL tool and customized to four vehicle… More >

  • Open Access

    ARTICLE

    Hybrid Task Scheduling Algorithm for Makespan Optimisation in Cloud Computing: A Performance Evaluation

    Abdulrahman M. Abdulghani*

    Journal on Artificial Intelligence, Vol.6, pp. 241-259, 2024, DOI:10.32604/jai.2024.056259 - 16 October 2024

    Abstract Cloud computing has rapidly evolved into a critical technology, seamlessly integrating into various aspects of daily life. As user demand for cloud services continues to surge, the need for efficient virtualization and resource management becomes paramount. At the core of this efficiency lies task scheduling, a complex process that determines how tasks are allocated and executed across cloud resources. While extensive research has been conducted in the area of task scheduling, optimizing multiple objectives simultaneously remains a significant challenge due to the NP (Non-deterministic Polynomial) Complete nature of the problem. This study aims to address… More >

  • Open Access

    ARTICLE

    MPDP: A Probabilistic Architecture for Microservice Performance Diagnosis and Prediction

    Talal H. Noor*

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1273-1299, 2024, DOI:10.32604/csse.2024.052510 - 13 September 2024

    Abstract In recent years, container-based cloud virtualization solutions have emerged to mitigate the performance gap between non-virtualized and virtualized physical resources. However, there is a noticeable absence of techniques for predicting microservice performance in current research, which impacts cloud service users’ ability to determine when to provision or de-provision microservices. Predicting microservice performance poses challenges due to overheads associated with actions such as variations in processing time caused by resource contention, which potentially leads to user confusion. In this paper, we propose, develop, and validate a probabilistic architecture named Microservice Performance Diagnosis and Prediction (MPDP). MPDP… More >

  • Open Access

    ARTICLE

    Data-Oriented Operating System for Big Data and Cloud

    Selwyn Darryl Kessler, Kok-Why Ng*, Su-Cheng Haw*

    Intelligent Automation & Soft Computing, Vol.39, No.4, pp. 633-647, 2024, DOI:10.32604/iasc.2024.054154 - 06 September 2024

    Abstract Operating System (OS) is a critical piece of software that manages a computer’s hardware and resources, acting as the intermediary between the computer and the user. The existing OS is not designed for Big Data and Cloud Computing, resulting in data processing and management inefficiency. This paper proposes a simplified and improved kernel on an x86 system designed for Big Data and Cloud Computing purposes. The proposed algorithm utilizes the performance benefits from the improved Input/Output (I/O) performance. The performance engineering runs the data-oriented design on traditional data management to improve data processing speed by… More >

  • Open Access

    ARTICLE

    FedAdaSS: Federated Learning with Adaptive Parameter Server Selection Based on Elastic Cloud Resources

    Yuwei Xu, Baokang Zhao*, Huan Zhou, Jinshu Su

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 609-629, 2024, DOI:10.32604/cmes.2024.053462 - 20 August 2024

    Abstract The rapid expansion of artificial intelligence (AI) applications has raised significant concerns about user privacy, prompting the development of privacy-preserving machine learning (ML) paradigms such as federated learning (FL). FL enables the distributed training of ML models, keeping data on local devices and thus addressing the privacy concerns of users. However, challenges arise from the heterogeneous nature of mobile client devices, partial engagement of training, and non-independent identically distributed (non-IID) data distribution, leading to performance degradation and optimization objective bias in FL training. With the development of 5G/6G networks and the integration of cloud computing… More >

  • Open Access

    ARTICLE

    MV-Honeypot: Security Threat Analysis by Deploying Avatar as a Honeypot in COTS Metaverse Platforms

    Arpita Dinesh Sarang1, Mohsen Ali Alawami2, Ki-Woong Park3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 655-669, 2024, DOI:10.32604/cmes.2024.053434 - 20 August 2024

    Abstract Nowadays, the use of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various purposes. Therefore, the Avatar and Metaverse are being developed with a new theory, application, and design, necessitating the association of more personal data and devices of targeted users every day. This Avatar and Metaverse technology explosion raises privacy and security concerns, leading to cyber attacks. MV-Honeypot, or Metaverse-Honeypot, as a commercial off-the-shelf solution that can counter these cyber attack-causing vulnerabilities, should be developed. To fill this gap, we study user’s More > Graphic Abstract

    MV-Honeypot: Security Threat Analysis by Deploying Avatar as a Honeypot in COTS Metaverse Platforms

  • Open Access

    ARTICLE

    Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System

    Youngho Park1, Su Jin Shin2, Sang Uk Shin3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.1, pp. 671-688, 2024, DOI:10.32604/cmes.2024.052378 - 20 August 2024

    Abstract Data trading enables data owners and data requesters to sell and purchase data. With the emergence of blockchain technology, research on blockchain-based data trading systems is receiving a lot of attention. Particularly, to reduce the on-chain storage cost, a novel paradigm of blockchain and cloud fusion has been widely considered as a promising data trading platform. Moreover, the fact that data can be used for commercial purposes will encourage users and organizations from various fields to participate in the data marketplace. In the data marketplace, it is a challenge how to trade the data securely… More >

  • Open Access

    ARTICLE

    Hierarchical Privacy Protection Model in Advanced Metering Infrastructure Based on Cloud and Fog Assistance

    Linghong Kuang1,2, Wenlong Shi1,2, Jing Zhang1,2,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 3193-3219, 2024, DOI:10.32604/cmc.2024.054377 - 15 August 2024

    Abstract The Advanced Metering Infrastructure (AMI), as a crucial subsystem in the smart grid, is responsible for measuring user electricity consumption and plays a vital role in communication between providers and consumers. However, with the advancement of information and communication technology, new security and privacy challenges have emerged for AMI. To address these challenges and enhance the security and privacy of user data in the smart grid, a Hierarchical Privacy Protection Model in Advanced Metering Infrastructure based on Cloud and Fog Assistance (HPPM-AMICFA) is proposed in this paper. The proposed model integrates cloud and fog computing… More >

Displaying 1-10 on page 1 of 456. Per Page