Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2025
Enhancing Autoscaling in Cloud Environment: Case of Hotels Network Management System
- Kvitoslava Obelovska,
- Orest Mamchuk,
- Andriy Abzyatov,
- Michal Gregus ml,
- Oleh Liskevych,
- Rostyslav Liskevych
Procedia Computer Science (PROCS), Volume 251, Issue CPages 639–644https://doi.org/10.1016/j.procs.2024.11.162AbstractThis study aims to improve the provision of services in a multi-client oriented system, the integrated incoming flow of requests from which has a dynamic, unpredictable nature of varying intensity and distribution. To serve such flows when using ...
- research-articleFebruary 2025
Integrating Edge Computing and Blockchain for Safer and More Efficient Digital Transportation Systems
Procedia Computer Science (PROCS), Volume 251, Issue CPages 273–280https://doi.org/10.1016/j.procs.2024.11.110AbstractThis paper investigates the integration of edge computing and Blockchain technologies within the context of digital transportation, focusing on the implementation of autonomous vehicle networks. By leveraging edge computing's real-time data ...
- research-articleFebruary 2025
A Cloud-based Secure Architecture for Remote Patient Monitoring Integrating OPC UA and Human Digital Twin
Procedia Computer Science (PROCS), Volume 251, Issue CPages 248–255https://doi.org/10.1016/j.procs.2024.11.107AbstractThis paper suggests a secure architecture for Remote Patient Monitoring (RPM) systems that integrate Azure IoT Hub, Azure Digital Twin, and OPC UA in order to enhance the security of patient data, data privacy, and personalized healthcare ...
- research-articleJanuary 2025
Utilizing Multiple Condition RSSI Distance Conversion on WiFi Localization
Procedia Computer Science (PROCS), Volume 246, Issue CPages 5304–5311https://doi.org/10.1016/j.procs.2024.09.645AbstractWith the rise of various emerging fraud crimes, criminals using communication devices (e.g., mobile phones) to defraud victims has become the mainstream trend in global crime. Therefore, how to effectively locate criminals has become the main ...
- research-articleJanuary 2025
Robust Automated Event Detection from Machine-Learning Analysis of Network Data
Procedia Computer Science (PROCS), Volume 246, Issue CPages 1619–1629https://doi.org/10.1016/j.procs.2024.09.635AbstractVisibility of network communications is critical for security analysts to understand, monitor, and secure computer systems. This visibility is difficult to achieve in the context of modern industrial control systems (ICSs) however, as these may ...
-
- research-articleJanuary 2025
Evaluating Current and Future Impacts of Cloud Computing on Enterprise Operations: A Comparative Analysis
Procedia Computer Science (PROCS), Volume 246, Issue CPages 5185–5194https://doi.org/10.1016/j.procs.2024.09.614AbstractThis study explores the perception of current and future impacts of Cloud Computing (CC) on enterprise operations, focusing on a comparative analysis among small and medium-sized enterprises (SMEs) in Poland. The research addresses two primary ...
- research-articleJanuary 2025
E-health Application In IoMT Environment Deployed in An Edge And Cloud Computing Platforms
Procedia Computer Science (PROCS), Volume 246, Issue CPages 1019–1028https://doi.org/10.1016/j.procs.2024.09.521AbstractDifferent countries may use E-health in Health systems that include all the institutions, organizations, and resources that are devoted to promote, sustain, or restore health.
The basic goal of E-health projects is to enhance the delay of the ...
- research-articleJanuary 2025
A scalable data acquisition system for the efficient processing of DNS network traffic
Procedia Computer Science (PROCS), Volume 246, Issue CPages 4702–4711https://doi.org/10.1016/j.procs.2024.09.335AbstractThe article covers the architecture developed to efficiently collect large-volume DNS traffic. The resulting collected dataset can be utilised in a multitude of scenarios, including anomaly detection, machine learning, and network monitoring. The ...
- research-articleJanuary 2025
Assessing the Robustness of ACLRPS-RC Algorithm on Microsoft Azure Dataset
Procedia Computer Science (PROCS), Volume 246, Issue CPages 169–178https://doi.org/10.1016/j.procs.2024.09.239AbstractThis paper presents a taxonomy of existing ”secure optimization” VM placement strategies. Notably, the Approximate Co-Location-Resistant Placement Strategy with Risk Constraint (ACLRPS-RC) demonstrated distinguishable performance in terms of ...
- research-articleJanuary 2025
Enhanced Energy Efficiency and Security Scheme via Watermarking in Wireless Sensor Networks
Procedia Computer Science (PROCS), Volume 246, Issue CPages 3614–3623https://doi.org/10.1016/j.procs.2024.09.196AbstractWireless sensor networks (WSNs) are increasingly used in critical applications, including agriculture, despite facing constraints such as limited energy and security vulnerabilities. In agriculture, where WSNs monitor crop aspects like irrigation ...
- research-articleJanuary 2025
An efficient and autonomous dynamic resource allocation in cloud computing with optimized task scheduling
Procedia Computer Science (PROCS), Volume 246, Issue CPages 3654–3663https://doi.org/10.1016/j.procs.2024.09.191AbstractResource allocation, scheduling, and provisioning are indeed critical and complex issues in cloud computing environments, as they directly impact both the user experience and the profitability of cloud service providers. Also, the excessive use of ...
- research-articleJanuary 2025
Real-time anonymisation of DNS network traffic
Procedia Computer Science (PROCS), Volume 246, Issue CPages 4018–4027https://doi.org/10.1016/j.procs.2024.09.176AbstractThe article covers the architecture developed to perform the anonymisation of active DNS traffic measurement. Data is anonymised on the fly using a proposed solution based on iptables. The proposed system was tested in the computer network of the ...
- research-articleJanuary 2024
Research on Management and Optimization of Big Data Computing Engine Based on Cloud Native Technology IT Architecture
Procedia Computer Science (PROCS), Volume 243, Issue CPages 910–917https://doi.org/10.1016/j.procs.2024.09.109AbstractIn the wave of digital transformation, we are in a data-driven era. With the explosive growth of data volume, traditional big data processing platforms are facing more and more challenges, including insufficient computational efficiency and ...
- research-articleJanuary 2024
Dynamic Resource Allocation of Reinforcement Learning Based on Neural Networks in Software Defined Networks
Procedia Computer Science (PROCS), Volume 243, Issue CPages 834–841https://doi.org/10.1016/j.procs.2024.09.100AbstractWith the rapid development of Software Defined Networking (SDN) technology, how to efficiently and flexibly manage and allocate network resources has become a key challenge. This article proposes the DDPG (Deep Deterministic Policy Gradient) ...
- research-articleJanuary 2024
Data Processing Technology for Network Abnormal Traffic Detection
Procedia Computer Science (PROCS), Volume 243, Issue CPages 610–618https://doi.org/10.1016/j.procs.2024.09.074AbstractAt present, the threats to network security are also increasing, among which abnormal traffic detection is the key link to ensure network security. Traditional detection methods based on signature or threshold are often difficult to adapt to the ...
- research-articleJanuary 2024
Design of Cloud Scheduling Simulation System for IoT Resources Based on Digital Intelligent Environment
Procedia Computer Science (PROCS), Volume 243, Issue CPages 413–422https://doi.org/10.1016/j.procs.2024.09.051AbstractWith the popularization of intelligent devices and the development of internet technology, the Internet of Things technology is receiving increasing attention. However, how to effectively schedule and manage resources in the Internet of Things ...
- research-articleJanuary 2024
Construction and Practice of Enterprise Information Security Management System of Intrusion Detection Technology
Procedia Computer Science (PROCS), Volume 243, Issue CPages 340–347https://doi.org/10.1016/j.procs.2024.09.042AbstractThis article focuses on the construction and practice of enterprise information security management system, and conducts in-depth research and practice on the information security needs of enterprises. For the information security management ...
- research-articleJanuary 2024
Design of Real-Time Measurement and Intelligent Path Selection System for Network Quality under Big Data
Procedia Computer Science (PROCS), Volume 243, Issue CPages 51–58https://doi.org/10.1016/j.procs.2024.09.008AbstractWith the emergence and development of new businesses such as video and language, people's requirements for the internet are constantly increasing. This article mainly uses the intelligent path selection method to design a real-time measurement ...
- research-articleJanuary 2024
Decentralized control of flow in complex networks
Procedia Computer Science (PROCS), Volume 241, Issue CPages 298–307https://doi.org/10.1016/j.procs.2024.08.040AbstractA decentralized control algorithm for routing flow in complex networks is proposed. The aim is to fairly distribute the supply/demand among the nodes while maintaining maximum flow in the network and satisfying the flow limits of the nodes and ...
- research-articleJanuary 2024
The Role of Fog Device Density in IoT-Fog-Cloud Systems
Procedia Computer Science (PROCS), Volume 241, Issue CPages 242–247https://doi.org/10.1016/j.procs.2024.08.033AbstractFog computing has emerged as an essential technology for enabling real-time, low-latency responses in cloud-based applications within Internet of Things (IoT) systems. This study explored the impact of the number of fog devices (NFDs) on the ...