Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Modified Computational Ranking Model for Cloud Trust Factor Using Fuzzy Logic

    Lei Shen*, Ting Huang, Nishui Cai, Hao Wu

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 507-524, 2023, DOI:10.32604/iasc.2023.037640 - 29 April 2023

    Abstract Through the use of the internet and cloud computing, users may access their data as well as the programmes they have installed. It is now more challenging than ever before to choose which cloud service providers to take advantage of. When it comes to the dependability of the cloud infrastructure service, those who supply cloud services, as well as those who seek cloud services, have an equal responsibility to exercise utmost care. Because of this, further caution is required to ensure that the appropriate values are reached in light of the ever-increasing need for correct… More >

  • Open Access

    ARTICLE

    Enhanced Metaheuristics with Trust Aware Route Selection for Wireless Sensor Networks

    A. Francis Saviour Devaraj1, T. Satyanarayana Murthy2, Fayadh Alenezi3, E. Laxmi Lydia4, Mohamad Adzhar Md Zawawi5, Mohamad Khairi Ishak5,*

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 1431-1445, 2023, DOI:10.32604/csse.2023.034421 - 09 February 2023

    Abstract Recently, a trust system was introduced to enhance security and cooperation between nodes in wireless sensor networks (WSN). In routing, the trust system includes or avoids nodes related to the estimated trust values in the routing function. This article introduces Enhanced Metaheuristics with Trust Aware Secure Route Selection Protocol (EMTA-SRSP) for WSN. The presented EMTA-SRSP technique majorly involves the optimal selection of routes in WSN. To accomplish this, the EMTA-SRSP technique involves the design of an oppositional Aquila optimization algorithm to choose safe routes for data communication. For the clustering process, the nodes with maximum More >

Displaying 1-10 on page 1 of 2. Per Page