Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (25)
  • Open Access

    ARTICLE

    Advancing 5G Network Applications Lifecycle Security: An ML-Driven Approach

    Ana Hermosilla1,2,*, Jorge Gallego-Madrid1, Pedro Martinez-Julia3, Jordi Ortiz4, Ved P. Kafle3, Antonio Skarmeta1,2

    CMES-Computer Modeling in Engineering & Sciences, Vol.141, No.2, pp. 1447-1471, 2024, DOI:10.32604/cmes.2024.053379 - 27 September 2024

    Abstract As 5th Generation (5G) and Beyond 5G (B5G) networks become increasingly prevalent, ensuring not only network security but also the security and reliability of the applications, the so-called network applications, becomes of paramount importance. This paper introduces a novel integrated model architecture, combining a network application validation framework with an AI-driven reactive system to enhance security in real-time. The proposed model leverages machine learning (ML) and artificial intelligence (AI) to dynamically monitor and respond to security threats, effectively mitigating potential risks before they impact the network infrastructure. This dual approach not only validates the functionality… More >

  • Open Access

    ARTICLE

    Service Function Chain Deployment Algorithm Based on Multi-Agent Deep Reinforcement Learning

    Wanwei Huang1,*, Qiancheng Zhang1, Tao Liu2, Yaoli Xu1, Dalei Zhang3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4875-4893, 2024, DOI:10.32604/cmc.2024.055622 - 12 September 2024

    Abstract Aiming at the rapid growth of network services, which leads to the problems of long service request processing time and high deployment cost in the deployment of network function virtualization service function chain (SFC) under 5G networks, this paper proposes a multi-agent deep deterministic policy gradient optimization algorithm for SFC deployment (MADDPG-SD). Initially, an optimization model is devised to enhance the request acceptance rate, minimizing the latency and deploying the cost SFC is constructed for the network resource-constrained case. Subsequently, we model the dynamic problem as a Markov decision process (MDP), facilitating adaptation to the… More >

  • Open Access

    ARTICLE

    Systematic Cloud-Based Optimization: Twin-Fold Moth Flame Algorithm for VM Deployment and Load-Balancing

    Umer Nauman1, Yuhong Zhang2, Zhihui Li3, Tong Zhen1,3,*

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 477-510, 2024, DOI:10.32604/iasc.2024.050726 - 11 July 2024

    Abstract Cloud computing has gained significant recognition due to its ability to provide a broad range of online services and applications. Nevertheless, existing commercial cloud computing models demonstrate an appropriate design by concentrating computational assets, such as preservation and server infrastructure, in a limited number of large-scale worldwide data facilities. Optimizing the deployment of virtual machines (VMs) is crucial in this scenario to ensure system dependability, performance, and minimal latency. A significant barrier in the present scenario is the load distribution, particularly when striving for improved energy consumption in a hypothetical grid computing framework. This design… More >

  • Open Access

    ARTICLE

    Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques

    Nasser Alshammari1, Shumaila Shahzadi2, Saad Awadh Alanazi1,*, Shahid Naseem3, Muhammad Anwar3, Madallah Alruwaili4, Muhammad Rizwan Abid5, Omar Alruwaili4, Ahmed Alsayat1, Fahad Ahmad6,7

    Computer Systems Science and Engineering, Vol.48, No.2, pp. 363-394, 2024, DOI:10.32604/csse.2023.040721 - 19 March 2024

    Abstract Software Defined Network (SDN) and Network Function Virtualization (NFV) technology promote several benefits to network operators, including reduced maintenance costs, increased network operational performance, simplified network lifecycle, and policies management. Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration (NFV MANO), and malicious attacks in different scenarios disrupt the NFV Orchestrator (NFVO) and Virtualized Infrastructure Manager (VIM) lifecycle management related to network services or individual Virtualized Network Function (VNF). This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and… More >

  • Open Access

    ARTICLE

    Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing

    Nader Abdel Karim1,*, Osama A. Khashan2,*, Waleed K. Abdulraheem3, Moutaz Alazab1, Hasan Kanaker4, Mahmoud E. Farfoura5, Mohammad Alshinwan5,6

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2023-2045, 2024, DOI:10.32604/cmc.2023.044304 - 27 February 2024

    Abstract As the extensive use of cloud computing raises questions about the security of any personal data stored there, cryptography is being used more frequently as a security tool to protect data confidentiality and privacy in the cloud environment. A hypervisor is a virtualization software used in cloud hosting to divide and allocate resources on various pieces of hardware. The choice of hypervisor can significantly impact the performance of cryptographic operations in the cloud environment. An important issue that must be carefully examined is that no hypervisor is completely superior in terms of performance; Each hypervisor… More >

  • Open Access

    ARTICLE

    An Adaptive Hybrid Optimization Strategy for Resource Allocation in Network Function Virtualization

    Chumei Wen1, Delu Zeng2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.2, pp. 1617-1636, 2024, DOI:10.32604/cmes.2023.029864 - 17 November 2023

    Abstract With the rapid development of Network Function Virtualization (NFV), the problem of low resource utilization in traditional data centers is gradually being addressed. However, existing research does not optimize both local and global allocation of resources in data centers. Hence, we propose an adaptive hybrid optimization strategy that combines dynamic programming and neural networks to improve resource utilization and service quality in data centers. Our approach encompasses a service function chain simulation generator, a parallel architecture service system, a dynamic programming strategy for maximizing the utilization of local server resources, a neural network for predicting More >

  • Open Access

    ARTICLE

    Optimizing Resource Allocation Framework for Multi-Cloud Environment

    Tahir Alyas1, Taher M. Ghazal2,3, Badria Sulaiman Alfurhood4, Ghassan F. Issa2, Osama Ali Thawabeh5, Qaiser Abbas6,*

    CMC-Computers, Materials & Continua, Vol.75, No.2, pp. 4119-4136, 2023, DOI:10.32604/cmc.2023.033916 - 31 March 2023

    Abstract Cloud computing makes dynamic resource provisioning more accessible. Monitoring a functioning service is crucial, and changes are made when particular criteria are surpassed. This research explores the decentralized multi-cloud environment for allocating resources and ensuring the Quality of Service (QoS), estimating the required resources, and modifying allotted resources depending on workload and parallelism due to resources. Resource allocation is a complex challenge due to the versatile service providers and resource providers. The engagement of different service and resource providers needs a cooperation strategy for a sustainable quality of service. The objective of a coherent and… More >

  • Open Access

    ARTICLE

    Performance Evaluation of Virtualization Methodologies to Facilitate NFV Deployment

    Sumbal Zahoor1, Ishtiaq Ahmad1, Ateeq Ur Rehman2, Elsayed Tag Eldin3, Nivin A. Ghamry4, Muhammad Shafiq5,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 311-329, 2023, DOI:10.32604/cmc.2023.035960 - 06 February 2023

    Abstract The development of the Next-Generation Wireless Network (NGWN) is becoming a reality. To conduct specialized processes more, rapid network deployment has become essential. Methodologies like Network Function Virtualization (NFV), Software-Defined Networks (SDN), and cloud computing will be crucial in addressing various challenges that 5G networks will face, particularly adaptability, scalability, and reliability. The motivation behind this work is to confirm the function of virtualization and the capabilities offered by various virtualization platforms, including hypervisors, clouds, and containers, which will serve as a guide to dealing with the stimulating environment of 5G. This is particularly crucial More >

  • Open Access

    ARTICLE

    Transparent Access to Heterogeneous IoT Based on Virtual Resources

    Wenquan Jin1, Sunhwan Lim2, Young-Ho Suh2, Chanwon Park2, Dohyeun Kim3,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 4983-4999, 2023, DOI:10.32604/cmc.2023.020851 - 28 December 2022

    Abstract The Internet of Things (IoT) inspires industries to deploy a massive number of connected devices to provide smart and ubiquitous services to influence our daily life. Edge computing leverages sufficient computation and storage at the edge of the network to enable deploying complex functions closer to the environment using Internet-connected devices. According to the purpose of the environment including privacy level, domain functionality, network scale and service quality, various environment-specific services can be provided through heterogeneous applications with sensors and actuators based on edge computing. However, for providing user-friendly service scenarios based on the transparent… More >

  • Open Access

    ARTICLE

    SFC Design and VNF Placement Based on Traffic Volume Scaling and VNF Dependency in 5G Networks

    Zhihao Zeng*, Zixiang Xia, Xiaoning Zhang, Yexiao He

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.3, pp. 1791-1814, 2023, DOI:10.32604/cmes.2022.021648 - 20 September 2022

    Abstract The development of Fifth-Generation (5G) mobile communication technology has remarkably promoted the spread of the Internet of Things (IoT) applications. As a promising paradigm for IoT, edge computing can process the amount of data generated by mobile intelligent devices in less time response. Network Function Virtualization (NFV) that decouples network functions from dedicated hardware is an important architecture to implement edge computing, deploying heterogeneous Virtual Network Functions (VNF) (such as computer vision, natural language processing, intelligent control, etc.) on the edge service nodes. With the NFV MANO (Management and Orchestration) framework, a Service Function Chain… More >

Displaying 1-10 on page 1 of 25. Per Page