Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (19)
  • Open Access

    ARTICLE

    Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem

    Guojun Wang1,2, Qi Liu3,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4471-4488, 2024, DOI:10.32604/cmc.2024.047669

    Abstract With the rapid advancement in exploring perceptual interactions and digital twins, metaverse technology has emerged to transcend the constraints of space-time and reality, facilitating remote AI-based collaboration. In this dynamic metasystem environment, frequent information exchanges necessitate robust security measures, with Authentication and Key Agreement (AKA) serving as the primary line of defense to ensure communication security. However, traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse. To address this challenge and enable nearly latency-free interactions, a novel low-latency AKA protocol based on chaotic maps is proposed. This protocol not only ensures mutual… More >

  • Open Access

    ARTICLE

    Multi-Agent Deep Reinforcement Learning for Efficient Computation Offloading in Mobile Edge Computing

    Tianzhe Jiao, Xiaoyue Feng, Chaopeng Guo, Dongqi Wang, Jie Song*

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3585-3603, 2023, DOI:10.32604/cmc.2023.040068

    Abstract Mobile-edge computing (MEC) is a promising technology for the fifth-generation (5G) and sixth-generation (6G) architectures, which provides resourceful computing capabilities for Internet of Things (IoT) devices, such as virtual reality, mobile devices, and smart cities. In general, these IoT applications always bring higher energy consumption than traditional applications, which are usually energy-constrained. To provide persistent energy, many references have studied the offloading problem to save energy consumption. However, the dynamic environment dramatically increases the optimization difficulty of the offloading decision. In this paper, we aim to minimize the energy consumption of the entire MEC system under the latency constraint by… More >

  • Open Access

    ARTICLE

    Survey of Resources Allocation Techniques with a Quality of Service (QoS) Aware in a Fog Computing Environment

    Wan Norsyafizan W. Muhamad1, Kaharudin Dimyati2, Muhammad Awais Javed3, Suzi Seroja Sarnin1,*, Divine Senanu Ametefe1

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1291-1308, 2023, DOI:10.32604/cmc.2023.037214

    Abstract The tremendous advancement in distributed computing and Internet of Things (IoT) applications has resulted in the adoption of fog computing as today’s widely used framework complementing cloud computing. Thus, suitable and effective applications could be performed to satisfy the applications’ latency requirement. Resource allocation techniques are essential aspects of fog networks which prevent unbalanced load distribution. Effective resource management techniques can improve the quality of service metrics. Due to the limited and heterogeneous resources available within the fog infrastructure, the fog layer’s resources need to be optimised to efficiently manage and distribute them to different applications within the IoT network.… More >

  • Open Access

    ARTICLE

    Energy and Latency Optimization in Edge-Fog-Cloud Computing for the Internet of Medical Things

    Hatem A. Alharbi1, Barzan A. Yosuf2, Mohammad Aldossary3,*, Jaber Almutairi4

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 1299-1319, 2023, DOI:10.32604/csse.2023.039367

    Abstract In this paper, the Internet of Medical Things (IoMT) is identified as a promising solution, which integrates with the cloud computing environment to provide remote health monitoring solutions and improve the quality of service (QoS) in the healthcare sector. However, problems with the present architectural models such as those related to energy consumption, service latency, execution cost, and resource usage, remain a major concern for adopting IoMT applications. To address these problems, this work presents a four-tier IoMT-edge-fog-cloud architecture along with an optimization model formulated using Mixed Integer Linear Programming (MILP), with the objective of efficiently processing and placing IoMT… More >

  • Open Access

    ARTICLE

    Latency-Aware Dynamic Second Offloading Service in SDN-Based Fog Architecture

    Samah Ibrahim AlShathri, Dina S. M. Hassan*, Samia Allaoua Chelloug

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1501-1526, 2023, DOI:10.32604/cmc.2023.035602

    Abstract Task offloading is a key strategy in Fog Computing (FC). The definition of resource-constrained devices no longer applies to sensors and Internet of Things (IoT) embedded system devices alone. Smart and mobile units can also be viewed as resource-constrained devices if the power, cloud applications, and data cloud are included in the set of required resources. In a cloud-fog-based architecture, a task instance running on an end device may need to be offloaded to a fog node to complete its execution. However, in a busy network, a second offloading decision is required when the fog node becomes overloaded. The possibility… More >

  • Open Access

    ARTICLE

    Device Discovery in D2D Communication: Scenarios and Challenges

    Adeel Iqbal1, Ali Nauman2, Riaz Hussain1, Irfan Latif Khan1, Ali Khaqan1, Sana Shuja1, Sung Won Kim2,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 1735-1750, 2023, DOI:10.32604/cmc.2023.034468

    Abstract Device to Device (D2D) communication is expected to be an essential part of 5G cellular networks. D2D communication enables close-proximity devices to establish a direct communication session. D2D communication offers many advantages, such as reduced latency, high data rates, range extension, and cellular offloading. The first step to establishing a D2D session is device discovery; an efficient device discovery will lead to efficient D2D communication. D2D device further needs to manage its mode of communication, perform resource allocation, manage its interference and most importantly control its power to improve the battery life of the device. This work has developed six… More >

  • Open Access

    ARTICLE

    An Optimal Algorithm for Resource Allocation in D2D Communication

    Shahad Alyousif1,2, Mohammed Dauwed3,*, Rafal Nader4, Mohammed Hasan Ali5, Mustafa Musa Jabar6,7, Ahmed Alkhayyat8

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 531-546, 2023, DOI:10.32604/cmc.2023.034329

    Abstract The number of mobile devices accessing wireless networks is skyrocketing due to the rapid advancement of sensors and wireless communication technology. In the upcoming years, it is anticipated that mobile data traffic would rise even more. The development of a new cellular network paradigm is being driven by the Internet of Things, smart homes, and more sophisticated applications with greater data rates and latency requirements. Resources are being used up quickly due to the steady growth of smartphone devices and multimedia apps. Computation offloading to either several distant clouds or close mobile devices has consistently improved the performance of mobile… More >

  • Open Access

    ARTICLE

    Latency Minimization Using an Adaptive Load Balancing Technique in Microservices Applications

    G. Selvakumar1,*, L. S. Jayashree2, S. Arumugam3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1215-1231, 2023, DOI:10.32604/csse.2023.032509

    Abstract Advancements in cloud computing and virtualization technologies have revolutionized Enterprise Application Development with innovative ways to design and develop complex systems. Microservices Architecture is one of the recent techniques in which Enterprise Systems can be developed as fine-grained smaller components and deployed independently. This methodology brings numerous benefits like scalability, resilience, flexibility in development, faster time to market, etc. and the advantages; Microservices bring some challenges too. Multiple microservices need to be invoked one by one as a chain. In most applications, more than one chain of microservices runs in parallel to complete a particular requirement To complete a user’s… More >

  • Open Access

    ARTICLE

    Fuzzy Logic Based Handover Authentication in 5g Telecommunication Heterogeneous Networks

    J. Divakaran1,*, Arvind Chakrapani2, K. Srihari3

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 1141-1152, 2023, DOI:10.32604/csse.2023.028050

    Abstract Under various deployment circumstances, fifth-generation (5G) telecommunications delivers improved network compound management with fast communication channels. Due to the introduction of the Internet of Things (IoT) in data management, the majority of the ultra-dense network models in 5G networks frequently have decreased spectral efficiency, weak handover management, and vulnerabilities. The majority of traditional handover authentication models are seriously threatened, making them vulnerable to a variety of security attacks. The authentication of networked devices is the most important issue. Therefore, a model that incorporates the handover mechanism and authentication model must be created. This article uses a fuzzy logic model to… More >

  • Open Access

    ARTICLE

    Performance Framework for Virtual Machine Migration in Cloud Computing

    Tahir Alyas1, Taher M. Ghazal2,3, Badria Sulaiman Alfurhood4, Munir Ahmad5, Ossma Ali Thawabeh6, Khalid Alissa7, Qaiser Abbas8,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6289-6305, 2023, DOI:10.32604/cmc.2023.035161

    Abstract In the cloud environment, the transfer of data from one cloud server to another cloud server is called migration. Data can be delivered in various ways, from one data centre to another. This research aims to increase the migration performance of the virtual machine (VM) in the cloud environment. VMs allow cloud customers to store essential data and resources. However, server usage has grown dramatically due to the virtualization of computer systems, resulting in higher data centre power consumption, storage needs, and operating expenses. Multiple VMs on one data centre manage share resources like central processing unit (CPU) cache, network… More >

Displaying 1-10 on page 1 of 19. Per Page