Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (305)
  • Open Access

    ARTICLE

    Optimization Model Proposal for Traffic Differentiation in Wireless Sensor Networks

    Adisa Hasković Džubur*, Samir Čaušević, Belma Memić, Muhamed Begović, Elma Avdagić-Golub, Alem Čolaković

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1059-1084, 2024, DOI:10.32604/cmc.2024.055386 - 15 October 2024

    Abstract Wireless sensor networks (WSNs) are characterized by heterogeneous traffic types (audio, video, data) and diverse application traffic requirements. This paper introduces three traffic classes following the defined model of heterogeneous traffic differentiation in WSNs. The requirements for each class regarding sensitivity to QoS (Quality of Service) parameters, such as loss, delay, and jitter, are described. These classes encompass real-time and delay-tolerant traffic. Given that QoS evaluation is a multi-criteria decision-making problem, we employed the AHP (Analytical Hierarchy Process) method for multi-criteria optimization. As a result of this approach, we derived weight values for different traffic… More >

  • Open Access

    ARTICLE

    Examining the Quality Metrics of a Communication Network with Distributed Software-Defined Networking Architecture

    Khawaja Tahir Mehmood1,2,*, Shahid Atiq1, Intisar Ali Sajjad3, Muhammad Majid Hussain4, Malik M. Abdul Basit2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1673-1708, 2024, DOI:10.32604/cmes.2024.053903 - 27 September 2024

    Abstract Software-Defined Networking (SDN), with segregated data and control planes, provides faster data routing, stability, and enhanced quality metrics, such as throughput (Th), maximum available bandwidth (Bd(max)), data transfer (DTransfer), and reduction in end-to-end delay (D(E-E)). This paper explores the critical work of deploying SDN in large­scale Data Center Networks (DCNs) to enhance its Quality of Service (QoS) parameters, using logically distributed control configurations. There is a noticeable increase in Delay(E-E) when adopting SDN with a unified (single) control structure in big DCNs to handle Hypertext Transfer Protocol (HTTP) requests causing a reduction in network quality parameters (Bd(max), Th, DTransfer, D(E-E),… More > Graphic Abstract

    Examining the Quality Metrics of a Communication Network with Distributed Software-Defined Networking Architecture

  • Open Access

    ARTICLE

    MPDP: A Probabilistic Architecture for Microservice Performance Diagnosis and Prediction

    Talal H. Noor*

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1273-1299, 2024, DOI:10.32604/csse.2024.052510 - 13 September 2024

    Abstract In recent years, container-based cloud virtualization solutions have emerged to mitigate the performance gap between non-virtualized and virtualized physical resources. However, there is a noticeable absence of techniques for predicting microservice performance in current research, which impacts cloud service users’ ability to determine when to provision or de-provision microservices. Predicting microservice performance poses challenges due to overheads associated with actions such as variations in processing time caused by resource contention, which potentially leads to user confusion. In this paper, we propose, develop, and validate a probabilistic architecture named Microservice Performance Diagnosis and Prediction (MPDP). MPDP… More >

  • Open Access

    ARTICLE

    Service Function Chain Deployment Algorithm Based on Multi-Agent Deep Reinforcement Learning

    Wanwei Huang1,*, Qiancheng Zhang1, Tao Liu2, Yaoli Xu1, Dalei Zhang3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4875-4893, 2024, DOI:10.32604/cmc.2024.055622 - 12 September 2024

    Abstract Aiming at the rapid growth of network services, which leads to the problems of long service request processing time and high deployment cost in the deployment of network function virtualization service function chain (SFC) under 5G networks, this paper proposes a multi-agent deep deterministic policy gradient optimization algorithm for SFC deployment (MADDPG-SD). Initially, an optimization model is devised to enhance the request acceptance rate, minimizing the latency and deploying the cost SFC is constructed for the network resource-constrained case. Subsequently, we model the dynamic problem as a Markov decision process (MDP), facilitating adaptation to the… More >

  • Open Access

    REVIEW

    Survey on Video Security: Examining Threats, Challenges, and Future Trends

    Ali Asghar1,#, Amna Shifa2,#, Mamoona Naveed Asghar2,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3591-3635, 2024, DOI:10.32604/cmc.2024.054654 - 12 September 2024

    Abstract Videos represent the most prevailing form of digital media for communication, information dissemination, and monitoring. However, their widespread use has increased the risks of unauthorised access and manipulation, posing significant challenges. In response, various protection approaches have been developed to secure, authenticate, and ensure the integrity of digital videos. This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality, integrity, and availability of video content, and examining how it can be manipulated. It then investigates current developments in the field of video security by exploring two critical research questions. First, it… More >

  • Open Access

    ARTICLE

    Internet of Things Enabled DDoS Attack Detection Using Pigeon Inspired Optimization Algorithm with Deep Learning Approach

    Turki Ali Alghamdi, Saud S. Alotaibi*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4047-4064, 2024, DOI:10.32604/cmc.2024.052796 - 12 September 2024

    Abstract Internet of Things (IoTs) provides better solutions in various fields, namely healthcare, smart transportation, home, etc. Recognizing Denial of Service (DoS) outbreaks in IoT platforms is significant in certifying the accessibility and integrity of IoT systems. Deep learning (DL) models outperform in detecting complex, non-linear relationships, allowing them to effectually severe slight deviations from normal IoT activities that may designate a DoS outbreak. The uninterrupted observation and real-time detection actions of DL participate in accurate and rapid detection, permitting proactive reduction events to be executed, hence securing the IoT network’s safety and functionality. Subsequently, this… More >

  • Open Access

    ARTICLE

    Risk-Balanced Routing Strategy for Service Function Chains of Cyber-Physical Power System Considering Cross-Space Cascading Failure

    He Wang, Xingyu Tong, Huanan Yu*, Xiao Hu, Jing Bian

    Energy Engineering, Vol.121, No.9, pp. 2525-2542, 2024, DOI:10.32604/ee.2024.050594 - 19 August 2024

    Abstract Cyber-physical power system (CPPS) has significantly improved the operational efficiency of power systems. However, cross-space cascading failures may occur due to the coupling characteristics, which poses a great threat to the safety and reliability of CPPS, and there is an acute need to reduce the probability of these failures. Towards this end, this paper first proposes a cascading failure index to identify and quantify the importance of different information in the same class of communication services. On this basis, a joint improved risk-balanced service function chain routing strategy (SFC-RS) is proposed, which is modeled as More >

  • Open Access

    ARTICLE

    Detection of Real-Time Distributed Denial-of-Service (DDoS) Attacks on Internet of Things (IoT) Networks Using Machine Learning Algorithms

    Zaed Mahdi1,*, Nada Abdalhussien2, Naba Mahmood1, Rana Zaki3,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2139-2159, 2024, DOI:10.32604/cmc.2024.053542 - 15 August 2024

    Abstract The primary concern of modern technology is cyber attacks targeting the Internet of Things. As it is one of the most widely used networks today and vulnerable to attacks. Real-time threats pose with modern cyber attacks that pose a great danger to the Internet of Things (IoT) networks, as devices can be monitored or service isolated from them and affect users in one way or another. Securing Internet of Things networks is an important matter, as it requires the use of modern technologies and methods, and real and up-to-date data to design and train systems… More >

  • Open Access

    ARTICLE

    Privacy-Preserving Healthcare and Medical Data Collaboration Service System Based on Blockchain and Federated Learning

    Fang Hu1, Siyi Qiu2, Xiaolian Yang1, Chaolei Wu1, Miguel Baptista Nunes3, Hui Chen4,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2897-2915, 2024, DOI:10.32604/cmc.2024.052570 - 15 August 2024

    Abstract As the volume of healthcare and medical data increases from diverse sources, real-world scenarios involving data sharing and collaboration have certain challenges, including the risk of privacy leakage, difficulty in data fusion, low reliability of data storage, low effectiveness of data sharing, etc. To guarantee the service quality of data collaboration, this paper presents a privacy-preserving Healthcare and Medical Data Collaboration Service System combining Blockchain with Federated Learning, termed FL-HMChain. This system is composed of three layers: Data extraction and storage, data management, and data application. Focusing on healthcare and medical data, a healthcare and… More >

  • Open Access

    ARTICLE

    Development of a Lightweight Model for Handwritten Dataset Recognition: Bangladeshi City Names in Bangla Script

    Md. Mahbubur Rahman Tusher1, Fahmid Al Farid2,*, Md. Al-Hasan1, Abu Saleh Musa Miah1, Susmita Roy Rinky1, Mehedi Hasan Jim1, Sarina Mansor2, Md. Abdur Rahim3, Hezerul Abdul Karim2,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2633-2656, 2024, DOI:10.32604/cmc.2024.049296 - 15 August 2024

    Abstract The context of recognizing handwritten city names, this research addresses the challenges posed by the manual inscription of Bangladeshi city names in the Bangla script. In today’s technology-driven era, where precise tools for reading handwritten text are essential, this study focuses on leveraging deep learning to understand the intricacies of Bangla handwriting. The existing dearth of dedicated datasets has impeded the progress of Bangla handwritten city name recognition systems, particularly in critical areas such as postal automation and document processing. Notably, no prior research has specifically targeted the unique needs of Bangla handwritten city name… More >

Displaying 1-10 on page 1 of 305. Per Page