Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (550)
  • Open Access

    ARTICLE

    A Fault-Tolerant Mobility-Aware Caching Method in Edge Computing

    Yong Ma1, Han Zhao2, Kunyin Guo3,*, Yunni Xia3,*, Xu Wang4, Xianhua Niu5, Dongge Zhu6, Yumin Dong7

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 907-927, 2024, DOI:10.32604/cmes.2024.048759

    Abstract Mobile Edge Computing (MEC) is a technology designed for the on-demand provisioning of computing and storage services, strategically positioned close to users. In the MEC environment, frequently accessed content can be deployed and cached on edge servers to optimize the efficiency of content delivery, ultimately enhancing the quality of the user experience. However, due to the typical placement of edge devices and nodes at the network’s periphery, these components may face various potential fault tolerance challenges, including network instability, device failures, and resource constraints. Considering the dynamic nature of MEC, making high-quality content caching decisions for real-time mobile applications, especially… More >

  • Open Access

    ARTICLE

    Computing Resource Allocation for Blockchain-Based Mobile Edge Computing

    Wanbo Zhang1, Yuqi Fan1, Jun Zhang1, Xu Ding2,*, Jung Yoon Kim3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 863-885, 2024, DOI:10.32604/cmes.2024.047295

    Abstract Users and edge servers are not fully mutually trusted in mobile edge computing (MEC), and hence blockchain can be introduced to provide trustable MEC. In blockchain-based MEC, each edge server functions as a node in both MEC and blockchain, processing users’ tasks and then uploading the task related information to the blockchain. That is, each edge server runs both users’ offloaded tasks and blockchain tasks simultaneously. Note that there is a trade-off between the resource allocation for MEC and blockchain tasks. Therefore, the allocation of the resources of edge servers to the blockchain and the MEC is crucial for the… More >

  • Open Access

    ARTICLE

    MPI/OpenMP-Based Parallel Solver for Imprint Forming Simulation

    Yang Li1, Jiangping Xu1,*, Yun Liu1, Wen Zhong2,*, Fei Wang3

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 461-483, 2024, DOI:10.32604/cmes.2024.046467

    Abstract In this research, we present the pure open multi-processing (OpenMP), pure message passing interface (MPI), and hybrid MPI/OpenMP parallel solvers within the dynamic explicit central difference algorithm for the coining process to address the challenge of capturing fine relief features of approximately 50 microns. Achieving such precision demands the utilization of at least 7 million tetrahedron elements, surpassing the capabilities of traditional serial programs previously developed. To mitigate data races when calculating internal forces, intermediate arrays are introduced within the OpenMP directive. This helps ensure proper synchronization and avoid conflicts during parallel execution. Additionally, in the MPI implementation, the coins… More > Graphic Abstract

    MPI/OpenMP-Based Parallel Solver for Imprint Forming Simulation

  • Open Access

    REVIEW

    A Review of Computing with Spiking Neural Networks

    Jiadong Wu, Yinan Wang*, Zhiwei Li*, Lun Lu, Qingjiang Li

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 2909-2939, 2024, DOI:10.32604/cmc.2024.047240

    Abstract Artificial neural networks (ANNs) have led to landmark changes in many fields, but they still differ significantly from the mechanisms of real biological neural networks and face problems such as high computing costs, excessive computing power, and so on. Spiking neural networks (SNNs) provide a new approach combined with brain-like science to improve the computational energy efficiency, computational architecture, and biological credibility of current deep learning applications. In the early stage of development, its poor performance hindered the application of SNNs in real-world scenarios. In recent years, SNNs have made great progress in computational performance and practicability compared with the… More >

  • Open Access

    ARTICLE

    Deep Learning-Based Secure Transmission Strategy with Sensor-Transmission-Computing Linkage for Power Internet of Things

    Bin Li*, Linghui Kong, Xiangyi Zhang, Bochuo Kou, Hui Yu, Bowen Liu

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3267-3282, 2024, DOI:10.32604/cmc.2024.047193

    Abstract The automatic collection of power grid situation information, along with real-time multimedia interaction between the front and back ends during the accident handling process, has generated a massive amount of power grid data. While wireless communication offers a convenient channel for grid terminal access and data transmission, it is important to note that the bandwidth of wireless communication is limited. Additionally, the broadcast nature of wireless transmission raises concerns about the potential for unauthorized eavesdropping during data transmission. To address these challenges and achieve reliable, secure, and real-time transmission of power grid data, an intelligent security transmission strategy with sensor-transmission-computing… More >

  • Open Access

    ARTICLE

    Task Offloading in Edge Computing Using GNNs and DQN

    Asier Garmendia-Orbegozo1, Jose David Nunez-Gonzalez1,*, Miguel Angel Anton2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2649-2671, 2024, DOI:10.32604/cmes.2024.045912

    Abstract In a network environment composed of different types of computing centers that can be divided into different layers (clod, edge layer, and others), the interconnection between them offers the possibility of peer-to-peer task offloading. For many resource-constrained devices, the computation of many types of tasks is not feasible because they cannot support such computations as they do not have enough available memory and processing capacity. In this scenario, it is worth considering transferring these tasks to resource-rich platforms, such as Edge Data Centers or remote cloud servers. For different reasons, it is more exciting and appropriate to download various tasks… More > Graphic Abstract

    Task Offloading in Edge Computing Using GNNs and DQN

  • Open Access

    ARTICLE

    MCWOA Scheduler: Modified Chimp-Whale Optimization Algorithm for Task Scheduling in Cloud Computing

    Chirag Chandrashekar1, Pradeep Krishnadoss1,*, Vijayakumar Kedalu Poornachary1, Balasundaram Ananthakrishnan1,2

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2593-2616, 2024, DOI:10.32604/cmc.2024.046304

    Abstract Cloud computing provides a diverse and adaptable resource pool over the internet, allowing users to tap into various resources as needed. It has been seen as a robust solution to relevant challenges. A significant delay can hamper the performance of IoT-enabled cloud platforms. However, efficient task scheduling can lower the cloud infrastructure’s energy consumption, thus maximizing the service provider’s revenue by decreasing user job processing times. The proposed Modified Chimp-Whale Optimization Algorithm called Modified Chimp-Whale Optimization Algorithm (MCWOA), combines elements of the Chimp Optimization Algorithm (COA) and the Whale Optimization Algorithm (WOA). To enhance MCWOA’s identification precision, the Sobol sequence… More >

  • Open Access

    ARTICLE

    Traffic-Aware Fuzzy Classification Model to Perform IoT Data Traffic Sourcing with the Edge Computing

    Huixiang Xu*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2309-2335, 2024, DOI:10.32604/cmc.2024.046253

    Abstract The Internet of Things (IoT) has revolutionized how we interact with and gather data from our surrounding environment. IoT devices with various sensors and actuators generate vast amounts of data that can be harnessed to derive valuable insights. The rapid proliferation of Internet of Things (IoT) devices has ushered in an era of unprecedented data generation and connectivity. These IoT devices, equipped with many sensors and actuators, continuously produce vast volumes of data. However, the conventional approach of transmitting all this data to centralized cloud infrastructures for processing and analysis poses significant challenges. However, transmitting all this data to a… More >

  • Open Access

    ARTICLE

    Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing

    Nader Abdel Karim1,*, Osama A. Khashan2,*, Waleed K. Abdulraheem3, Moutaz Alazab1, Hasan Kanaker4, Mahmoud E. Farfoura5, Mohammad Alshinwan5,6

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2023-2045, 2024, DOI:10.32604/cmc.2023.044304

    Abstract As the extensive use of cloud computing raises questions about the security of any personal data stored there, cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment. A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware. The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment. An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance; Each hypervisor should be examined to meet… More >

  • Open Access

    ARTICLE

    Lightweight Intrusion Detection Using Reservoir Computing

    Jiarui Deng1,2, Wuqiang Shen1,3, Yihua Feng4, Guosheng Lu5, Guiquan Shen1,3, Lei Cui1,3, Shanxiang Lyu1,2,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1345-1361, 2024, DOI:10.32604/cmc.2023.047079

    Abstract The blockchain-empowered Internet of Vehicles (IoV) enables various services and achieves data security and privacy, significantly advancing modern vehicle systems. However, the increased frequency of data transmission and complex network connections among nodes also make them more susceptible to adversarial attacks. As a result, an efficient intrusion detection system (IDS) becomes crucial for securing the IoV environment. Existing IDSs based on convolutional neural networks (CNN) often suffer from high training time and storage requirements. In this paper, we propose a lightweight IDS solution to protect IoV against both intra-vehicle and external threats. Our approach achieves superior performance, as demonstrated by… More >

Displaying 1-10 on page 1 of 550. Per Page