Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (46)
  • Open Access

    ARTICLE

    Machine Learning Empowered Security Management and Quality of Service Provision in SDN-NFV Environment

    Shumaila Shahzadi1, Fahad Ahmad1,*, Asma Basharat1, Madallah Alruwaili2, Saad Alanazi2, Mamoona Humayun2, Muhammad Rizwan1, Shahid Naseem3

    CMC-Computers, Materials & Continua, Vol.66, No.3, pp. 2723-2749, 2021, DOI:10.32604/cmc.2021.014594

    Abstract With the rising demand for data access, network service providers face the challenge of growing their capital and operating costs while at the same time enhancing network capacity and meeting the increased demand for access. To increase efficacy of Software Defined Network (SDN) and Network Function Virtualization (NFV) framework, we need to eradicate network security configuration errors that may create vulnerabilities to affect overall efficiency, reduce network performance, and increase maintenance cost. The existing frameworks lack in security, and computer systems face few abnormalities, which prompts the need for different recognition and mitigation methods to keep the system in the… More >

  • Open Access

    ARTICLE

    Functionality Aware Dynamic Composition of Web Services

    Mohemmed Sha*, Abdalla Alameen

    Computer Systems Science and Engineering, Vol.36, No.1, pp. 201-211, 2021, DOI:10.32604/csse.2021.014513

    Abstract The composition of the web service is a common technique to attain the best results of complex web tasks. The selection of appropriate web services, linking those services in the action flow and attaining the actual functionality of the task are the important factors to be considered. Even though different frameworks and methods have been proposed to dynamically compose web services, each method has its advantage and disadvantage over the other. Most of the methods give much importance to the Quality of Service (QoS) but fail to achieve the actual functionality after composition. This paper proposes a functionality-oriented composition technique… More >

  • Open Access

    ARTICLE

    Traffic Queuing Management in the Internet of Things: An Optimized RED Algorithm Based Approach

    Abdul Waheed1,2,*, Naila Habib Khan3, Mahdi Zareei4, Shahab Ul Islam5, Latif Jan5,6, Arif Iqbal Umar1, Ehab Mahmoud Mohamed7,8

    CMC-Computers, Materials & Continua, Vol.66, No.1, pp. 359-372, 2021, DOI:10.32604/cmc.2020.012196

    Abstract Congestion control is one of the main obstacles in cyberspace traffic. Overcrowding in internet traffic may cause several problems; such as high packet hold-up, high packet dropping, and low packet output. In the course of data transmission for various applications in the Internet of things, such problems are usually generated relative to the input. To tackle such problems, this paper presents an analytical model using an optimized Random Early Detection (RED) algorithm-based approach for internet traffic management. The validity of the proposed model is checked through extensive simulation-based experiments. An analysis is observed for different functions on internet traffic. Four… More >

  • Open Access

    ARTICLE

    Performance Analysis of Intelligent CR-NOMA Model for Industrial IoT Communications

    Yinghua Zhang1,2, Jian Liu1, Yunfeng Peng1, Yanfang Dong2, Changming Zhao3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.1, pp. 239-257, 2020, DOI:10.32604/cmes.2020.010778

    Abstract Aiming for ultra-reliable low-latency wireless communications required in industrial internet of things (IIoT) applications, this paper studies a simple cognitive radio non-orthogonal multiple access (CR-NOMA) downlink system. This system consists of two secondary users (SUs) dynamically interfered by the primary user (PU), and its performance is characterized by the outage probability of the SU communications. This outage probability is calculated under two conditions where, a) the transmission of PU starts after the channel state information (CSI) is acquired, so the base station (BS) is oblivious of the interference, and b) when the BS is aware of the PU interference, and… More >

  • Open Access

    ARTICLE

    Performance Anomaly Detection in Web Services: An RNN- Based Approach Using Dynamic Quality of Service Features

    Muhammad Hasnain1, Seung Ryul Jeong2, *, Muhammad Fermi Pasha3, Imran Ghani4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 729-752, 2020, DOI:10.32604/cmc.2020.010394

    Abstract Performance anomaly detection is the process of identifying occurrences that do not conform to expected behavior or correlate with other incidents or events in time series data. Anomaly detection has been applied to areas such as fraud detection, intrusion detection systems, and network systems. In this paper, we propose an anomaly detection framework that uses dynamic features of quality of service that are collected in a simulated setup. Three variants of recurrent neural networks-SimpleRNN, long short term memory, and gated recurrent unit are evaluated. The results reveal that the proposed method effectively detects anomalies in web services with high accuracy.… More >

  • Open Access

    ARTICLE

    Prediction of Web Services Reliability Based on Decision Tree Classification Method

    Zhichun Jia1, 2, Qiuyang Han1, Yanyan Li1, Yuqiang Yang1, Xing Xing1, 2, *

    CMC-Computers, Materials & Continua, Vol.63, No.3, pp. 1221-1235, 2020, DOI:10.32604/cmc.2020.09722

    Abstract With the development of the service-oriented computing (SOC), web service has an important and popular solution for the design of the application system to various enterprises. Nowadays, the numerous web services are provided by the service providers on the network, it becomes difficult for users to select the best reliable one from a large number of services with the same function. So it is necessary to design feasible selection strategies to provide users with the reliable services. Most existing methods attempt to select services according to accurate predictions for the quality of service (QoS) values. However, because the network and… More >

Displaying 41-50 on page 5 of 46. Per Page