Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (96)
  • Open Access

    ARTICLE

    Optimization Model Proposal for Traffic Differentiation in Wireless Sensor Networks

    Adisa Hasković Džubur*, Samir Čaušević, Belma Memić, Muhamed Begović, Elma Avdagić-Golub, Alem Čolaković

    CMC-Computers, Materials & Continua, Vol.81, No.1, pp. 1059-1084, 2024, DOI:10.32604/cmc.2024.055386 - 15 October 2024

    Abstract Wireless sensor networks (WSNs) are characterized by heterogeneous traffic types (audio, video, data) and diverse application traffic requirements. This paper introduces three traffic classes following the defined model of heterogeneous traffic differentiation in WSNs. The requirements for each class regarding sensitivity to QoS (Quality of Service) parameters, such as loss, delay, and jitter, are described. These classes encompass real-time and delay-tolerant traffic. Given that QoS evaluation is a multi-criteria decision-making problem, we employed the AHP (Analytical Hierarchy Process) method for multi-criteria optimization. As a result of this approach, we derived weight values for different traffic… More >

  • Open Access

    ARTICLE

    MPDP: A Probabilistic Architecture for Microservice Performance Diagnosis and Prediction

    Talal H. Noor*

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1273-1299, 2024, DOI:10.32604/csse.2024.052510 - 13 September 2024

    Abstract In recent years, container-based cloud virtualization solutions have emerged to mitigate the performance gap between non-virtualized and virtualized physical resources. However, there is a noticeable absence of techniques for predicting microservice performance in current research, which impacts cloud service users’ ability to determine when to provision or de-provision microservices. Predicting microservice performance poses challenges due to overheads associated with actions such as variations in processing time caused by resource contention, which potentially leads to user confusion. In this paper, we propose, develop, and validate a probabilistic architecture named Microservice Performance Diagnosis and Prediction (MPDP). MPDP… More >

  • Open Access

    REVIEW

    Survey on Video Security: Examining Threats, Challenges, and Future Trends

    Ali Asghar1,#, Amna Shifa2,#, Mamoona Naveed Asghar2,*

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 3591-3635, 2024, DOI:10.32604/cmc.2024.054654 - 12 September 2024

    Abstract Videos represent the most prevailing form of digital media for communication, information dissemination, and monitoring. However, their widespread use has increased the risks of unauthorised access and manipulation, posing significant challenges. In response, various protection approaches have been developed to secure, authenticate, and ensure the integrity of digital videos. This study provides a comprehensive survey of the challenges associated with maintaining the confidentiality, integrity, and availability of video content, and examining how it can be manipulated. It then investigates current developments in the field of video security by exploring two critical research questions. First, it… More >

  • Open Access

    ARTICLE

    Development of a Lightweight Model for Handwritten Dataset Recognition: Bangladeshi City Names in Bangla Script

    Md. Mahbubur Rahman Tusher1, Fahmid Al Farid2,*, Md. Al-Hasan1, Abu Saleh Musa Miah1, Susmita Roy Rinky1, Mehedi Hasan Jim1, Sarina Mansor2, Md. Abdur Rahim3, Hezerul Abdul Karim2,*

    CMC-Computers, Materials & Continua, Vol.80, No.2, pp. 2633-2656, 2024, DOI:10.32604/cmc.2024.049296 - 15 August 2024

    Abstract The context of recognizing handwritten city names, this research addresses the challenges posed by the manual inscription of Bangladeshi city names in the Bangla script. In today’s technology-driven era, where precise tools for reading handwritten text are essential, this study focuses on leveraging deep learning to understand the intricacies of Bangla handwriting. The existing dearth of dedicated datasets has impeded the progress of Bangla handwritten city name recognition systems, particularly in critical areas such as postal automation and document processing. Notably, no prior research has specifically targeted the unique needs of Bangla handwritten city name… More >

  • Open Access

    ARTICLE

    BArcherFuzzer: An Android System Services Fuzzier via Transaction Dependencies of BpBinder

    Jiawei Qin1,2, Hua Zhang1,*, Hanbing Yan2, Tian Zhu2, Song Hu1, Dingyu Yan2

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 527-544, 2024, DOI:10.32604/iasc.2024.047509 - 11 July 2024

    Abstract By the analysis of vulnerabilities of Android native system services, we find that some vulnerabilities are caused by inconsistent data transmission and inconsistent data processing logic between client and server. The existing research cannot find the above two types of vulnerabilities and the test cases of them face the problem of low coverage. In this paper, we propose an extraction method of test cases based on the native system services of the client and design a case construction method that supports multi-parameter mutation based on genetic algorithm and priority strategy. Based on the above method, More >

  • Open Access

    REVIEW

    Ecosystem Services of Grazed Grasslands in the Flooding Pampa

    Elizabeth J. Jacobo1,#,*, Adriana M. Rodríguez2,#

    Phyton-International Journal of Experimental Botany, Vol.93, No.6, pp. 1179-1202, 2024, DOI:10.32604/phyton.2024.050928 - 27 June 2024

    Abstract The Flooding Pampa grasslands are the last remnant of the Rio de la Plata grasslands in Argentina. Anthropogenic interventions have led to severe degradation and, as a result, the ecosystem services provided by the grasslands are declining, in terms of provisioning, regulating, and supporting services. We synthesized the existing literature on the ecosystem goods and services provided by these grasslands under grazing in different conditions and conservation status. We found that plant and animal diversity and primary production are the most studied ecosystem services, while climate regulation, water supply, nutrient cycling, meat production and erosion… More >

  • Open Access

    ARTICLE

    A Hybrid Machine Learning Approach for Improvised QoE in Video Services over 5G Wireless Networks

    K. B. Ajeyprasaath, P. Vetrivelan*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3195-3213, 2024, DOI:10.32604/cmc.2023.046911 - 26 March 2024

    Abstract Video streaming applications have grown considerably in recent years. As a result, this becomes one of the most significant contributors to global internet traffic. According to recent studies, the telecommunications industry loses millions of dollars due to poor video Quality of Experience (QoE) for users. Among the standard proposals for standardizing the quality of video streaming over internet service providers (ISPs) is the Mean Opinion Score (MOS). However, the accurate finding of QoE by MOS is subjective and laborious, and it varies depending on the user. A fully automated data analytics framework is required to… More >

  • Open Access

    ARTICLE

    Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques

    Nasser Alshammari1, Shumaila Shahzadi2, Saad Awadh Alanazi1,*, Shahid Naseem3, Muhammad Anwar3, Madallah Alruwaili4, Muhammad Rizwan Abid5, Omar Alruwaili4, Ahmed Alsayat1, Fahad Ahmad6,7

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 363-394, 2024, DOI:10.32604/csse.2023.040721 - 19 March 2024

    Abstract Software Defined Network (SDN) and Network Function Virtualization (NFV) technology promote several benefits to network operators, including reduced maintenance costs, increased network operational performance, simplified network lifecycle, and policies management. Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration (NFV MANO), and malicious attacks in different scenarios disrupt the NFV Orchestrator (NFVO) and Virtualized Infrastructure Manager (VIM) lifecycle management related to network services or individual Virtualized Network Function (VNF). This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and… More >

  • Open Access

    ARTICLE

    RESTlogic: Detecting Logic Vulnerabilities in Cloud REST APIs

    Ziqi Wang*, Weihan Tian, Baojiang Cui

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 1797-1820, 2024, DOI:10.32604/cmc.2023.047051 - 27 February 2024

    Abstract The API used to access cloud services typically follows the Representational State Transfer (REST) architecture style. RESTful architecture, as a commonly used Application Programming Interface (API) architecture paradigm, not only brings convenience to platforms and tenants, but also brings logical security challenges. Security issues such as quota bypass and privilege escalation are closely related to the design and implementation of API logic. Traditional code level testing methods are difficult to construct a testing model for API logic and test samples for in-depth testing of API logic, making it difficult to detect such logical vulnerabilities. We… More >

  • Open Access

    ARTICLE

    Models to Simulate Effective Coverage of Fire Station Based on Real-Time Travel Times

    Sicheng Zhu, Dingli Liu*, Weijun Liu, Ying Li, Tian Zhou

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.1, pp. 483-513, 2024, DOI:10.32604/cmes.2023.044809 - 30 December 2023

    Abstract In recent years, frequent fire disasters have led to enormous damage in China. Effective firefighting rescues can minimize the losses caused by fires. During the rescue processes, the travel time of fire trucks can be severely affected by traffic conditions, changing the effective coverage of fire stations. However, it is still challenging to determine the effective coverage of fire stations considering dynamic traffic conditions. This paper addresses this issue by combining the traveling time calculation model with the effective coverage simulation model. In addition, it proposes a new index of total effective coverage area (TECA)… More >

Displaying 1-10 on page 1 of 96. Per Page