Empowering Human Decision-Making in AI Models: The Path to Trust and Transparency
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 311-329, 2023, DOI:10.32604/cmc.2023.035960
Abstract The development of the Next-Generation Wireless Network (NGWN) is becoming a reality. To conduct specialized processes more, rapid network deployment has become essential. Methodologies like Network Function Virtualization (NFV), Software-Defined Networks (SDN), and cloud computing will be crucial in addressing various challenges that 5G networks will face, particularly adaptability, scalability, and reliability. The motivation behind this work is to confirm the function of virtualization and the capabilities offered by various virtualization platforms, including hypervisors, clouds, and containers, which will serve as a guide to dealing with the stimulating environment of 5G. This is particularly crucial when implementing network operations at… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4983-4999, 2023, DOI:10.32604/cmc.2023.020851
Abstract The Internet of Things (IoT) inspires industries to deploy a massive number of connected devices to provide smart and ubiquitous services to influence our daily life. Edge computing leverages sufficient computation and storage at the edge of the network to enable deploying complex functions closer to the environment using Internet-connected devices. According to the purpose of the environment including privacy level, domain functionality, network scale and service quality, various environment-specific services can be provided through heterogeneous applications with sensors and actuators based on edge computing. However, for providing user-friendly service scenarios based on the transparent access to heterogeneous devices in… More >
Open Access
ARTICLE
CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.3, pp. 1791-1814, 2023, DOI:10.32604/cmes.2022.021648
Abstract The development of Fifth-Generation (5G) mobile communication technology has remarkably promoted the spread of the Internet of Things (IoT) applications. As a promising paradigm for IoT, edge computing can process the amount of data generated by mobile intelligent devices in less time response. Network Function Virtualization (NFV) that decouples network functions from dedicated hardware is an important architecture to implement edge computing, deploying heterogeneous Virtual Network Functions (VNF) (such as computer vision, natural language processing, intelligent control, etc.) on the edge service nodes. With the NFV MANO (Management and Orchestration) framework, a Service Function Chain (SFC) that contains a set… More >
Open Access
ARTICLE
Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 1565-1580, 2023, DOI:10.32604/iasc.2023.026360
Abstract Cloud computing involves remote server deployments with public network infrastructures that allow clients to access computational resources. Virtual Machines (VMs) are supplied on requests and launched without interactions from service providers. Intruders can target these servers and establish malicious connections on VMs for carrying out attacks on other clustered VMs. The existing system has issues with execution time and false-positive rates. Hence, the overall system performance is degraded considerably. The proposed approach is designed to eliminate Cross-VM side attacks and VM escape and hide the server’s position so that the opponent cannot track the target server beyond a certain point.… More >
Open Access
ARTICLE
Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1165-1179, 2023, DOI:10.32604/iasc.2023.028815
Abstract Kubernetes, a container orchestrator for cloud-deployed applications, allows the application provider to scale automatically to match the fluctuating intensity of processing demand. Container cluster technology is used to encapsulate, isolate, and deploy applications, addressing the issue of low system reliability due to interlocking failures. Cloud-based platforms usually entail users define application resource supplies for eco container virtualization. There is a constant problem of over-service in data centers for cloud service providers. Higher operating costs and incompetent resource utilization can occur in a waste of resources. Kubernetes revolutionized the orchestration of the container in the cloud-native age. It can adaptively manage… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.43, No.3, pp. 1131-1144, 2022, DOI:10.32604/csse.2022.022480
Abstract In this,communication world, the Network Function Virtualization concept is utilized for many businesses, small services to virtualize the network node function and to build a block that may connect the chain, communication services. Mainly, Virtualized Network Function Forwarding Graph (VNF-FG) has been used to define the connection between the VNF and to give the best end-to-end services. In the existing method, VNF mapping and backup VNF were proposed but there was no profit and reliability improvement of the backup and mapping of the primary VNF. As a consequence, this paper offers a Hybrid Hexagon-Cost Efficient algorithm for determining the best… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3319-3335, 2022, DOI:10.32604/cmc.2022.023215
Abstract Federated learning (FL) activates distributed on-device computation techniques to model a better algorithm performance with the interaction of local model updates and global model distributions in aggregation averaging processes. However, in large-scale heterogeneous Internet of Things (IoT) cellular networks, massive multi-dimensional model update iterations and resource-constrained computation are challenging aspects to be tackled significantly. This paper introduces the system model of converging software-defined networking (SDN) and network functions virtualization (NFV) to enable device/resource abstractions and provide NFV-enabled edge FL (eFL) aggregation servers for advancing automation and controllability. Multi-agent deep Q-networks (MADQNs) target to enforce a self-learning softwarization, optimize resource allocation… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.42, No.1, pp. 245-256, 2022, DOI:10.32604/csse.2022.022122
Abstract Cloud Computing provides various services to the customer in a flexible and reliable manner. Virtual Machines (VM) are created from physical resources of the data center for handling huge number of requests as a task. These tasks are executed in the VM at the data center which needs excess hosts for satisfying the customer request. The VM migration solves this problem by migrating the VM from one host to another host and makes the resources available at any time. This process is carried out based on various algorithms which follow a predefined capacity of source VM leads to the capacity… More >
Open Access
ARTICLE
Computer Systems Science and Engineering, Vol.41, No.2, pp. 751-765, 2022, DOI:10.32604/csse.2022.020534
Abstract Fog computing provides quality of service for cloud infrastructure. As the data computation intensifies, edge computing becomes difficult. Therefore, mobile fog computing is used for reducing traffic and the time for data computation in the network. In previous studies, software-defined networking (SDN) and network functions virtualization (NFV) were used separately in edge computing. Current industrial and academic research is tackling to integrate SDN and NFV in different environments to address the challenges in performance, reliability, and scalability. SDN/NFV is still in development. The traditional Internet of things (IoT) data analysis system is only based on a linear and time-variant system… More >
Open Access
ARTICLE
CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5601-5630, 2022, DOI:10.32604/cmc.2022.020348
Abstract Detection of epileptic seizures on the basis of Electroencephalogram (EEG) recordings is a challenging task due to the complex, non-stationary and non-linear nature of these biomedical signals. In the existing literature, a number of automatic epileptic seizure detection methods have been proposed that extract useful features from EEG segments and classify them using machine learning algorithms. Some characterizing features of epileptic and non-epileptic EEG signals overlap; therefore, it requires that analysis of signals must be performed from diverse perspectives. Few studies analyzed these signals in diverse domains to identify distinguishing characteristics of epileptic EEG signals. To pose the challenge mentioned… More >