Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (550)
  • Open Access

    ARTICLE

    Hybrid Hierarchical Particle Swarm Optimization with Evolutionary Artificial Bee Colony Algorithm for Task Scheduling in Cloud Computing

    Shasha Zhao1,2,3,*, Huanwen Yan1,2, Qifeng Lin1,2, Xiangnan Feng1,2, He Chen1,2, Dengyin Zhang1,2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1135-1156, 2024, DOI:10.32604/cmc.2024.045660

    Abstract Task scheduling plays a key role in effectively managing and allocating computing resources to meet various computing tasks in a cloud computing environment. Short execution time and low load imbalance may be the challenges for some algorithms in resource scheduling scenarios. In this work, the Hierarchical Particle Swarm Optimization-Evolutionary Artificial Bee Colony Algorithm (HPSO-EABC) has been proposed, which hybrids our presented Evolutionary Artificial Bee Colony (EABC), and Hierarchical Particle Swarm Optimization (HPSO) algorithm. The HPSO-EABC algorithm incorporates both the advantages of the HPSO and the EABC algorithm. Comprehensive testing including evaluations of algorithm convergence speed, resource execution time, load balancing,… More >

  • Open Access

    ARTICLE

    Enhancing IoT Security: Quantum-Level Resilience against Threats

    Hosam Alhakami*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 329-356, 2024, DOI:10.32604/cmc.2023.043439

    Abstract The rapid growth of the Internet of Things (IoT) operations has necessitated the incorporation of quantum computing technologies to meet its expanding needs. This integration is motivated by the need to solve the specific issues provided by the expansion of IoT and the potential benefits that quantum computing can offer in this scenario. The combination of IoT and quantum computing creates new privacy and security problems. This study examines the critical need to prevent potential security concerns from quantum computing in IoT applications. We investigate the incorporation of quantum computing approaches within IoT security frameworks, with a focus on developing… More >

  • Open Access

    ARTICLE

    Intelligent Solution System for Cloud Security Based on Equity Distribution: Model and Algorithms

    Sarah Mustafa Eljack1,*, Mahdi Jemmali2,3,4, Mohsen Denden6,7, Mutasim Al Sadig1, Abdullah M. Algashami1, Sadok Turki5

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1461-1479, 2024, DOI:10.32604/cmc.2023.040919

    Abstract In the cloud environment, ensuring a high level of data security is in high demand. Data planning storage optimization is part of the whole security process in the cloud environment. It enables data security by avoiding the risk of data loss and data overlapping. The development of data flow scheduling approaches in the cloud environment taking security parameters into account is insufficient. In our work, we propose a data scheduling model for the cloud environment. The model is made up of three parts that together help dispatch user data flow to the appropriate cloud VMs. The first component is the… More >

  • Open Access

    ARTICLE

    Large-Scale 3D Thermal Transfer Analysis with 1D Model of Piped Cooling Water

    Shigeki Kaneko1, Naoto Mitsume2, Shinobu Yoshimura1,*

    Digital Engineering and Digital Twin, Vol.2, pp. 33-48, 2024, DOI:10.32604/dedt.2023.044279

    Abstract In an integrated coal gasification combined cycle plant, cooling pipes are installed in the gasifier reactor and water cooling is executed to avoid reaching an excessively high temperature. To accelerate the design, it is necessary to develop an analysis system that can simulate the cooling operation within the practical computational time. In the present study, we assumed the temperature fields of the cooled object and the cooling water to be governed by the three-dimensional (3D) heat equation and the one-dimensional (1D) convection-diffusion equation, respectively. Although some existing studies have employed similar modeling, the applications have been limited to simple-shaped structures.… More >

  • Open Access

    ARTICLE

    IoT Task Offloading in Edge Computing Using Non-Cooperative Game Theory for Healthcare Systems

    Dinesh Mavaluru1,*, Chettupally Anil Carie2, Ahmed I. Alutaibi3, Satish Anamalamudi2, Bayapa Reddy Narapureddy4, Murali Krishna Enduri2, Md Ezaz Ahmed1

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 1487-1503, 2024, DOI:10.32604/cmes.2023.045277

    Abstract In this paper, we present a comprehensive system model for Industrial Internet of Things (IIoT) networks empowered by Non-Orthogonal Multiple Access (NOMA) and Mobile Edge Computing (MEC) technologies. The network comprises essential components such as base stations, edge servers, and numerous IIoT devices characterized by limited energy and computing capacities. The central challenge addressed is the optimization of resource allocation and task distribution while adhering to stringent queueing delay constraints and minimizing overall energy consumption. The system operates in discrete time slots and employs a quasi-static approach, with a specific focus on the complexities of task partitioning and the management… More >

  • Open Access

    ARTICLE

    A Deep Learning Approach for Landmines Detection Based on Airborne Magnetometry Imaging and Edge Computing

    Ahmed Barnawi1,*, Krishan Kumar2, Neeraj Kumar1, Bander Alzahrani1, Amal Almansour1

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 2117-2137, 2024, DOI:10.32604/cmes.2023.044184

    Abstract Landmines continue to pose an ongoing threat in various regions around the world, with countless buried landmines affecting numerous human lives. The detonation of these landmines results in thousands of casualties reported worldwide annually. Therefore, there is a pressing need to employ diverse landmine detection techniques for their removal. One effective approach for landmine detection is UAV (Unmanned Aerial Vehicle) based Airborne Magnetometry, which identifies magnetic anomalies in the local terrestrial magnetic field. It can generate a contour plot or heat map that visually represents the magnetic field strength. Despite the effectiveness of this approach, landmine removal remains a challenging… More >

  • Open Access

    ARTICLE

    A Secure and Cost-Effective Training Framework Atop Serverless Computing for Object Detection in Blasting Sites

    Tianming Zhang1, Zebin Chen1, Haonan Guo2, Bojun Ren1, Quanmin Xie3,*, Mengke Tian4,*, Yong Wang4

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.2, pp. 2139-2154, 2024, DOI:10.32604/cmes.2023.043822

    Abstract The data analysis of blasting sites has always been the research goal of relevant researchers. The rise of mobile blasting robots has aroused many researchers’ interest in machine learning methods for target detection in the field of blasting. Serverless Computing can provide a variety of computing services for people without hardware foundations and rich software development experience, which has aroused people’s interest in how to use it in the field of machine learning. In this paper, we design a distributed machine learning training application based on the AWS Lambda platform. Based on data parallelism, the data aggregation and training synchronization… More >

  • Open Access

    ARTICLE

    Binary Archimedes Optimization Algorithm for Computing Dominant Metric Dimension Problem

    Basma Mohamed1,*, Linda Mohaisen2, Mohammed Amin1

    Intelligent Automation & Soft Computing, Vol.38, No.1, pp. 19-34, 2023, DOI:10.32604/iasc.2023.031947

    Abstract In this paper, we consider the NP-hard problem of finding the minimum dominant resolving set of graphs. A vertex set B of a connected graph G resolves G if every vertex of G is uniquely identified by its vector of distances to the vertices in B. A resolving set is dominating if every vertex of G that does not belong to B is a neighbor to some vertices in B. The dominant metric dimension of G is the cardinality number of the minimum dominant resolving set. The dominant metric dimension is computed by a binary version of the Archimedes optimization… More >

  • Open Access

    ARTICLE

    A Multi-Objective Genetic Algorithm Based Load Balancing Strategy for Health Monitoring Systems in Fog-Cloud

    Hayder Makki Shakir, Jaber Karimpour*, Jafar Razmara

    Computer Systems Science and Engineering, Vol.48, No.1, pp. 35-55, 2024, DOI:10.32604/csse.2023.038545

    Abstract As the volume of data and data-generating equipment in healthcare settings grows, so do issues like latency and inefficient processing inside health monitoring systems. The Internet of Things (IoT) has been used to create a wide variety of health monitoring systems. Most modern health monitoring solutions are based on cloud computing. However, large-scale deployment of latency-sensitive healthcare applications is hampered by the cloud’s design, which introduces significant delays during the processing of vast data volumes. By strategically positioning servers close to end users, fog computing mitigates latency issues and dramatically improves scaling on demand, resource accessibility, and security. In this… More >

  • Open Access

    ARTICLE

    An Adaptive Parallel Feedback-Accelerated Picard Iteration Method for Simulating Orbit Propagation

    Changtao Wang, Honghua Dai*, Wenchuan Yang

    Digital Engineering and Digital Twin, Vol.1, pp. 3-13, 2023, DOI:10.32604/dedt.2023.044210

    Abstract A novel Adaptive Parallel Feedback-Accelerated Picard Iteration (AP-FAPI) method is proposed to meet the requirements of various aerospace missions for fast and accurate orbit propagation. The Parallel Feedback-Accelerated Picard Iteration (P-FAPI) method is an advanced iterative collocation method. With large-step computing and parallel acceleration, the P-FAPI method outperforms the traditional finite-difference-based methods, which require small-step and serial integration to ensure accuracy. Although efficient and accurate, the P-FAPI method suffers extensive trials in tuning method parameters, strongly influencing its performance. To overcome this problem, we propose the AP-FAPI method based on the relationship between the parameters and the convergence speed leveraging… More >

Displaying 11-20 on page 2 of 550. Per Page