Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (29)
  • Open Access

    ARTICLE

    Numerical Simulation of Two-Phase Flow in Glutenite Reservoirs for Optimized Deployment in Horizontal Wells

    Yuhui Zhou1,2,3,*, Shichang Ju4, Qijun Lyu4, Hongfei Chen4, Xuebiao Du4, Aiping Zheng4, Wenshun Chen4, Ning Li4

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.1, pp. 245-259, 2023, DOI:10.32604/fdmp.2023.019971

    Abstract It is known that the pore media characteristics of glutenite reservoirs are different from those of conventional sandstone reservoirs. Low reservoir permeability and naturally developed microfractures make water injection in this kind of reservoir very difficult. In this study, new exploitation methods are explored. Using a real glutenite reservoir as a basis, a three-dimensional fine geological model is elaborated. Then, combining the model with reservoir performance information, and through a historical fitting analysis, the saturation abundance distribution of remaining oil in the reservoir is determined. It is shown that, using this information, predictions can be made about whether the considered… More >

  • Open Access

    ARTICLE

    Production Dynamic Prediction Method of Waterflooding Reservoir Based on Deep Convolution Generative Adversarial Network (DC-GAN)

    Liyuan Xin1,2,3, Xiang Rao1,2,3,*, Xiaoyin Peng1,2,3, Yunfeng Xu1,2,3, Jiating Chen1,2,3

    Energy Engineering, Vol.119, No.5, pp. 1905-1922, 2022, DOI:10.32604/ee.2022.019556

    Abstract The rapid production dynamic prediction of water-flooding reservoirs based on well location deployment has been the basis of production optimization of water-flooding reservoirs. Considering that the construction of geological models with traditional numerical simulation software is complicated, the computational efficiency of the simulation calculation is often low, and the numerical simulation tools need to be repeated iteratively in the process of model optimization, machine learning methods have been used for fast reservoir simulation. However, traditional artificial neural network (ANN) has large degrees of freedom, slow convergence speed, and complex network model. This paper aims to predict the production performance of… More >

  • Open Access

    ARTICLE

    Optimal Deployment of Heterogeneous Nodes to Enhance Network Invulnerability

    Qian Sun1,2, Fengbo Yang1,2, Xiaoyi Wang2,3,*, Jiping Xu1,2, Huiyan Zhang1,2, Li Wang1,2, Jiabin Yu1,2, Xiao Peng1,2, Ruichao Wang4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3081-3097, 2022, DOI:10.32604/cmc.2022.029366

    Abstract Wireless sensor networks (WSN) can be used in many fields. In wireless sensor networks, sensor nodes transmit data in multi hop mode. The large number of hops required by data transmission will lead to unbalanced energy consumption and large data transmission delay of the whole network, which greatly affects the invulnerability of the network. Therefore, an optimal deployment of heterogeneous nodes (ODHN) algorithm is proposed to enhance the invulnerability of the wireless sensor networks. The algorithm combines the advantages of DEEC (design of distributed energy efficient clustering) clustering algorithm and BAS (beetle antenna search) optimization algorithm to find the globally… More >

  • Open Access

    ARTICLE

    Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing

    Abdul Saboor1,*, Mohd Fadzil Hassan2, Rehan Akbar1, Erwin Susanto3, Syed Nasir Mehmood Shah4, Muhammad Aadil Siddiqui5, Saeed Ahmed Magsi5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2223-2239, 2022, DOI:10.32604/cmc.2022.028382

    Abstract Cloud computing has gained significant use over the last decade due to its several benefits, including cost savings associated with setup, deployments, delivery, physical resource sharing across virtual machines, and availability of on-demand cloud services. However, in addition to usual threats in almost every computing environment, cloud computing has also introduced a set of new threats as consumers share physical resources due to the physical co-location paradigm. Furthermore, since there are a growing number of attacks directed at cloud environments (including dictionary attacks, replay code attacks, denial of service attacks, rootkit attacks, code injection attacks, etc.), customers require additional assurances… More >

  • Open Access

    ARTICLE

    Intelligent Deployment Model for Target Coverage in Wireless Sensor Network

    K. Subramanian*, S. Shanmugavel

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 739-754, 2023, DOI:10.32604/iasc.2023.027248

    Abstract Target coverage and continuous connection are the major recital factors for Wireless Sensor Network (WSN). Several previous research works studied various algorithms for target coverage difficulties; however they lacked to focus on improving the network’s life time in terms of energy. This research work mainly focuses on target coverage and area coverage problem in a heterogeneous WSN with increased network lifetime. The dynamic behavior of the target nodes is unpredictable, because the target nodes may move at any time in any direction of the network. Thus, target coverage becomes a major problem in WSN and its applications. To solve the… More >

  • Open Access

    ARTICLE

    Forecasting Mental Stress Using Machine Learning Algorithms

    Elias Hossain1, Abdulwahab Alazeb2,*, Naif Al Mudawi2, Sultan Almakdi2, Mohammed Alshehri2, M. Gazi Golam Faruque3, Wahidur Rahman3

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 4945-4966, 2022, DOI:10.32604/cmc.2022.027058

    Abstract Depression is a crippling affliction and affects millions of individuals around the world. In general, the physicians screen patients for mental health disorders on a regular basis and treat patients in collaboration with psychologists and other mental health experts, which results in lower costs and improved patient outcomes. However, this strategy can necessitate a lot of buy-in from a large number of people, as well as additional training and logistical considerations. Thus, utilizing the machine learning algorithms, patients with depression based on information generally present in a medical file were analyzed and predicted. The methodology of this proposed study is… More >

  • Open Access

    ARTICLE

    Design of Energy Efficient WSN Using a Noble SMOWA Algorithm

    Avishek Banerjee1, Deepak Garg1, Victor Das2, Laxminarayan Sahoo3, Ira Nath4, Vijayakumar Varadarajan5, Ketan Kotecha6,*

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3585-3600, 2022, DOI:10.32604/cmc.2022.025233

    Abstract In this paper, the establishment of efficient Wireless Sensor Network (WSN) networks has been projected to minimize the consumption of energy using a new Self-adaptive Multi-Objective Weighted Approach (SMOWA) algorithm for solving a multi-objective problem. The Different WSN nodes deployment policies have been proposed and applied in this paper to design an efficient Wireless Sensor Network to minimize energy consumption. After that, the cluster head for each cluster has been selected with the help of the duty cycle. After configuring the WSN networks, the SMOWA algorithms have been developed to obtain the minimum energy consumption for the networks. Energy minimization,… More >

  • Open Access

    ARTICLE

    An Efficient On-Demand Virtual Machine Migration in Cloud Using Common Deployment Model

    C. Saravanakumar1,*, R. Priscilla1, B. Prabha2, A. Kavitha3, M. Prakash4, C. Arun5

    Computer Systems Science and Engineering, Vol.42, No.1, pp. 245-256, 2022, DOI:10.32604/csse.2022.022122

    Abstract Cloud Computing provides various services to the customer in a flexible and reliable manner. Virtual Machines (VM) are created from physical resources of the data center for handling huge number of requests as a task. These tasks are executed in the VM at the data center which needs excess hosts for satisfying the customer request. The VM migration solves this problem by migrating the VM from one host to another host and makes the resources available at any time. This process is carried out based on various algorithms which follow a predefined capacity of source VM leads to the capacity… More >

  • Open Access

    ARTICLE

    Deployment of Polar Codes for Mission-Critical Machine-Type Communication Over Wireless Networks

    Najib Ahmed Mohammed1, Ali Mohammed Mansoor1,*, Rodina Binti Ahmad1, Saaidal Razalli Bin Azzuhri2

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 573-592, 2022, DOI:10.32604/cmc.2022.020462

    Abstract Mission critical Machine-type Communication (mcMTC), also referred to as Ultra-reliable Low Latency Communication (URLLC), has become a research hotspot. It is primarily characterized by communication that provides ultra-high reliability and very low latency to concurrently transmit short commands to a massive number of connected devices. While the reduction in physical (PHY) layer overhead and improvement in channel coding techniques are pivotal in reducing latency and improving reliability, the current wireless standards dedicated to support mcMTC rely heavily on adopting the bottom layers of general-purpose wireless standards and customizing only the upper layers. The mcMTC has a significant technical impact on… More >

  • Open Access

    ARTICLE

    Exploring and Modelling IoT Offloading Policies in Edge Cloud Environments

    Jaber Almutairi1, Mohammad Aldossary2,*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 611-624, 2022, DOI:10.32604/csse.2022.018112

    Abstract The Internet of Things (IoT) has recently become a popular technology that can play increasingly important roles in every aspect of our daily life. For collaboration between IoT devices and edge cloud servers, edge server nodes provide the computation and storage capabilities for IoT devices through the task offloading process for accelerating tasks with large resource requests. However, the quantitative impact of different offloading architectures and policies on IoT applications’ performance remains far from clear, especially with a dynamic and unpredictable range of connected physical and virtual devices. To this end, this work models the performance impact by exploiting a… More >

Displaying 11-20 on page 2 of 29. Per Page