Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Service Function Chain Deployment Algorithm Based on Multi-Agent Deep Reinforcement Learning

    Wanwei Huang1,*, Qiancheng Zhang1, Tao Liu2, Yaoli Xu1, Dalei Zhang3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4875-4893, 2024, DOI:10.32604/cmc.2024.055622 - 12 September 2024

    Abstract Aiming at the rapid growth of network services, which leads to the problems of long service request processing time and high deployment cost in the deployment of network function virtualization service function chain (SFC) under 5G networks, this paper proposes a multi-agent deep deterministic policy gradient optimization algorithm for SFC deployment (MADDPG-SD). Initially, an optimization model is devised to enhance the request acceptance rate, minimizing the latency and deploying the cost SFC is constructed for the network resource-constrained case. Subsequently, we model the dynamic problem as a Markov decision process (MDP), facilitating adaptation to the… More >

  • Open Access

    ARTICLE

    Distributed Resource Allocation in Dispersed Computing Environment Based on UAV Track Inspection in Urban Rail Transit

    Tong Gan1, Shuo Dong1, Shiyou Wang1, Jiaxin Li2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 643-660, 2024, DOI:10.32604/cmc.2024.051408 - 18 July 2024

    Abstract With the rapid development of urban rail transit, the existing track detection has some problems such as low efficiency and insufficient detection coverage, so an intelligent and automatic track detection method based on UAV is urgently needed to avoid major safety accidents. At the same time, the geographical distribution of IoT devices results in the inefficient use of the significant computing potential held by a large number of devices. As a result, the Dispersed Computing (DCOMP) architecture enables collaborative computing between devices in the Internet of Everything (IoE), promotes low-latency and efficient cross-wide applications, and… More >

  • Open Access

    ARTICLE

    Wireless Sensor Networks Routing Attacks Prevention with Blockchain and Deep Neural Network

    Mohamed Ali1, Ibrahim A. Abd El-Moghith2, Mohamed N. El-Derini3, Saad M. Darwish2,*

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 6127-6140, 2022, DOI:10.32604/cmc.2022.021305 - 11 October 2021

    Abstract Routing is a key function in Wireless Sensor Networks (WSNs) since it facilitates data transfer to base stations. Routing attacks have the potential to destroy and degrade the functionality of WSNs. A trustworthy routing system is essential for routing security and WSN efficiency. Numerous methods have been implemented to build trust between routing nodes, including the use of cryptographic methods and centralized routing. Nonetheless, the majority of routing techniques are unworkable in reality due to the difficulty of properly identifying untrusted routing node activities. At the moment, there is no effective way to avoid malicious… More >

Displaying 1-10 on page 1 of 3. Per Page