Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (574)
  • Open Access

    ARTICLE

    Efficient Digital Twin Placement for Blockchain-Empowered Wireless Computing Power Network

    Wei Wu, Liang Yu, Liping Yang*, Yadong Zhang, Peng Wang

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 587-603, 2024, DOI:10.32604/cmc.2024.052655

    Abstract As an open network architecture, Wireless Computing Power Networks (WCPN) pose new challenges for achieving efficient and secure resource management in networks, because of issues such as insecure communication channels and untrusted device terminals. Blockchain, as a shared, immutable distributed ledger, provides a secure resource management solution for WCPN. However, integrating blockchain into WCPN faces challenges like device heterogeneity, monitoring communication states, and dynamic network nature. Whereas Digital Twins (DT) can accurately maintain digital models of physical entities through real-time data updates and self-learning, enabling continuous optimization of WCPN, improving synchronization performance, ensuring real-time accuracy, More >

  • Open Access

    ARTICLE

    Distributed Resource Allocation in Dispersed Computing Environment Based on UAV Track Inspection in Urban Rail Transit

    Tong Gan1, Shuo Dong1, Shiyou Wang1, Jiaxin Li2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 643-660, 2024, DOI:10.32604/cmc.2024.051408

    Abstract With the rapid development of urban rail transit, the existing track detection has some problems such as low efficiency and insufficient detection coverage, so an intelligent and automatic track detection method based on UAV is urgently needed to avoid major safety accidents. At the same time, the geographical distribution of IoT devices results in the inefficient use of the significant computing potential held by a large number of devices. As a result, the Dispersed Computing (DCOMP) architecture enables collaborative computing between devices in the Internet of Everything (IoE), promotes low-latency and efficient cross-wide applications, and… More >

  • Open Access

    ARTICLE

    Optimized Binary Neural Networks for Road Anomaly Detection: A TinyML Approach on Edge Devices

    Amna Khatoon1, Weixing Wang1,*, Asad Ullah2, Limin Li3,*, Mengfei Wang1

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 527-546, 2024, DOI:10.32604/cmc.2024.051147

    Abstract Integrating Tiny Machine Learning (TinyML) with edge computing in remotely sensed images enhances the capabilities of road anomaly detection on a broader level. Constrained devices efficiently implement a Binary Neural Network (BNN) for road feature extraction, utilizing quantization and compression through a pruning strategy. The modifications resulted in a 28-fold decrease in memory usage and a 25% enhancement in inference speed while only experiencing a 2.5% decrease in accuracy. It showcases its superiority over conventional detection algorithms in different road image scenarios. Although constrained by computer resources and training datasets, our results indicate opportunities for More >

  • Open Access

    ARTICLE

    Automatic Rule Discovery for Data Transformation Using Fusion of Diversified Feature Formats

    G. Sunil Santhosh Kumar1,2,*, M. Rudra Kumar3

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 695-713, 2024, DOI:10.32604/cmc.2024.050143

    Abstract This article presents an innovative approach to automatic rule discovery for data transformation tasks leveraging XGBoost, a machine learning algorithm renowned for its efficiency and performance. The framework proposed herein utilizes the fusion of diversified feature formats, specifically, metadata, textual, and pattern features. The goal is to enhance the system’s ability to discern and generalize transformation rules from source to destination formats in varied contexts. Firstly, the article delves into the methodology for extracting these distinct features from raw data and the pre-processing steps undertaken to prepare the data for the model. Subsequent sections expound… More >

  • Open Access

    ARTICLE

    A Novel Optimization Approach for Energy-Efficient Multiple Workflow Scheduling in Cloud Environment

    Ambika Aggarwal1, Sunil Kumar2,3, Ashok Bhansali4, Deema Mohammed Alsekait5,*, Diaa Salama AbdElminaam6,7,8

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 953-967, 2024, DOI:10.32604/csse.2024.050406

    Abstract Existing multiple workflow scheduling techniques focus on traditional Quality of Service (QoS) parameters such as cost, deadline, and makespan to find optimal solutions by consuming a large amount of electrical energy. Higher energy consumption decreases system efficiency, increases operational cost, and generates more carbon footprint. These major problems can lead to several problems, such as economic strain, environmental degradation, resource depletion, energy dependence, health impacts, etc. In a cloud computing environment, scheduling multiple workflows is critical in developing a strategy for energy optimization, which is an NP-hard problem. This paper proposes a novel, bi-phase Energy-Efficient… More >

  • Open Access

    ARTICLE

    Reducing the Encrypted Data Size: Healthcare with IoT-Cloud Computing Applications

    Romaissa Kebache1, Abdelkader Laouid1,*, Ahcene Bounceur2, Mostefa Kara1,3, Konstantinos Karampidis4, Giorgos Papadourakis4, Mohammad Hammoudeh2

    Computer Systems Science and Engineering, Vol.48, No.4, pp. 1055-1072, 2024, DOI:10.32604/csse.2024.048738

    Abstract Internet cloud services come at a price, especially when they provide top-tier security measures. The cost incurred by cloud utilization is directly proportional to the storage requirements. Companies are always looking to increase profits and reduce costs while preserving the security of their data by encrypting them. One of the offered solutions is to find an efficient encryption method that can store data in a much smaller space than traditional encryption techniques. This article introduces a novel encryption approach centered on consolidating information into a single ciphertext by implementing Multi-Key Embedded Encryption (MKEE). The effectiveness… More >

  • Open Access

    ARTICLE

    Systematic Cloud-Based Optimization: Twin-Fold Moth Flame Algorithm for VM Deployment and Load-Balancing

    Umer Nauman1, Yuhong Zhang2, Zhihui Li3, Tong Zhen1,3,*

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 477-510, 2024, DOI:10.32604/iasc.2024.050726

    Abstract Cloud computing has gained significant recognition due to its ability to provide a broad range of online services and applications. Nevertheless, existing commercial cloud computing models demonstrate an appropriate design by concentrating computational assets, such as preservation and server infrastructure, in a limited number of large-scale worldwide data facilities. Optimizing the deployment of virtual machines (VMs) is crucial in this scenario to ensure system dependability, performance, and minimal latency. A significant barrier in the present scenario is the load distribution, particularly when striving for improved energy consumption in a hypothetical grid computing framework. This design… More >

  • Open Access

    REVIEW

    Systematic Review: Load Balancing in Cloud Computing by Using Metaheuristic Based Dynamic Algorithms

    Darakhshan Syed*, Ghulam Muhammad, Safdar Rizvi

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 437-476, 2024, DOI:10.32604/iasc.2024.050681

    Abstract Cloud Computing has the ability to provide on-demand access to a shared resource pool. It has completely changed the way businesses are managed, implement applications, and provide services. The rise in popularity has led to a significant increase in the user demand for services. However, in cloud environments efficient load balancing is essential to ensure optimal performance and resource utilization. This systematic review targets a detailed description of load balancing techniques including static and dynamic load balancing algorithms. Specifically, metaheuristic-based dynamic load balancing algorithms are identified as the optimal solution in case of increased traffic. More >

  • Open Access

    REVIEW

    Applications of Soft Computing Methods in Backbreak Assessment in Surface Mines: A Comprehensive Review

    Mojtaba Yari1,*, Manoj Khandelwal2, Payam Abbasi3, Evangelos I. Koutras4, Danial Jahed Armaghani5,*, Panagiotis G. Asteris4

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.3, pp. 2207-2238, 2024, DOI:10.32604/cmes.2024.048071

    Abstract Geo-engineering problems are known for their complexity and high uncertainty levels, requiring precise definitions, past experiences, logical reasoning, mathematical analysis, and practical insight to address them effectively. Soft Computing (SC) methods have gained popularity in engineering disciplines such as mining and civil engineering due to computer hardware and machine learning advancements. Unlike traditional hard computing approaches, SC models use soft values and fuzzy sets to navigate uncertain environments. This study focuses on the application of SC methods to predict backbreak, a common issue in blasting operations within mining and civil projects. Backbreak, which refers to More >

  • Open Access

    ARTICLE

    GCAGA: A Gini Coefficient-Based Optimization Strategy for Computation Offloading in Multi-User-Multi-Edge MEC System

    Junqing Bai1, Qiuchao Dai1,*, Yingying Li2

    CMC-Computers, Materials & Continua, Vol.79, No.3, pp. 5083-5103, 2024, DOI:10.32604/cmc.2024.050921

    Abstract To support the explosive growth of Information and Communications Technology (ICT), Mobile Edge Computing (MEC) provides users with low latency and high bandwidth service by offloading computational tasks to the network’s edge. However, resource-constrained mobile devices still suffer from a capacity mismatch when faced with latency-sensitive and compute-intensive emerging applications. To address the difficulty of running computationally intensive applications on resource-constrained clients, a model of the computation offloading problem in a network consisting of multiple mobile users and edge cloud servers is studied in this paper. Then a user benefit function EoU (Experience of Users) is… More >

Displaying 1-10 on page 1 of 574. Per Page