Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (44)
  • Open Access

    ARTICLE

    Hybrid Power Bank Deployment Model for Energy Supply Coverage Optimization in Industrial Wireless Sensor Network

    Hang Yang1,2,*, Xunbo Li1, Witold Pedrycz2

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1531-1551, 2023, DOI:10.32604/iasc.2023.039256 - 21 June 2023

    Abstract Energy supply is one of the most critical challenges of wireless sensor networks (WSNs) and industrial wireless sensor networks (IWSNs). While research on coverage optimization problem (COP) centers on the network’s monitoring coverage, this research focuses on the power banks’ energy supply coverage. The study of 2-D and 3-D spaces is typical in IWSN, with the realistic environment being more complex with obstacles (i.e., machines). A 3-D surface is the field of interest (FOI) in this work with the established hybrid power bank deployment model for the energy supply COP optimization of IWSN. The hybrid… More >

  • Open Access

    ARTICLE

    Overbooking-Enabled Task Scheduling and Resource Allocation in Mobile Edge Computing Environments

    Jixun Gao1,2, Bingyi Hu2, Jialei Liu3,4,*, Huaichen Wang5, Quanzhen Huang1, Yuanyuan Zhao6

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1-16, 2023, DOI:10.32604/iasc.2023.036890 - 29 April 2023

    Abstract Mobile Edge Computing (MEC) is proposed to solve the needs of Internet of Things (IoT) users for high resource utilization, high reliability and low latency of service requests. However, the backup virtual machine is idle when its primary virtual machine is running normally, which will waste resources. Overbooking the backup virtual machine under the above circumstances can effectively improve resource utilization. First, these virtual machines are deployed into slots randomly, and then some tasks with cooperative relationship are offloaded to virtual machines for processing. Different deployment locations have different resource utilization and average service response… More >

  • Open Access

    ARTICLE

    Performance Evaluation of Virtualization Methodologies to Facilitate NFV Deployment

    Sumbal Zahoor1, Ishtiaq Ahmad1, Ateeq Ur Rehman2, Elsayed Tag Eldin3, Nivin A. Ghamry4, Muhammad Shafiq5,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 311-329, 2023, DOI:10.32604/cmc.2023.035960 - 06 February 2023

    Abstract The development of the Next-Generation Wireless Network (NGWN) is becoming a reality. To conduct specialized processes more, rapid network deployment has become essential. Methodologies like Network Function Virtualization (NFV), Software-Defined Networks (SDN), and cloud computing will be crucial in addressing various challenges that 5G networks will face, particularly adaptability, scalability, and reliability. The motivation behind this work is to confirm the function of virtualization and the capabilities offered by various virtualization platforms, including hypervisors, clouds, and containers, which will serve as a guide to dealing with the stimulating environment of 5G. This is particularly crucial More >

  • Open Access

    ARTICLE

    Investigation on the Folding Mode and Deployment Process of an Inflatable Boarding Platform for the Marine Emergency Evacuation System

    Chongyang Nie, Fankai Kong*, Huaqiu Ding, Hongli Pan

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 483-510, 2023, DOI:10.32604/cmes.2022.021083 - 29 September 2022

    Abstract The different folding and storage forms of an inflatable boarding platform will have a direct impact on the deployment effect of the marine emergency evacuation system. This paper proposes different folding and storage methods for an inflatable boarding platform in a marine emergency evacuation system. According to the difference between the fold line and the fold direction, the numerical models of a boarding platform with partial fold, “Z” type fold and inner spiral fold are established. The platform models with three folding modes are simulated by numerical simulation. According to the numerical results of the More > Graphic Abstract

    Investigation on the Folding Mode and Deployment Process of an Inflatable Boarding Platform for the Marine Emergency Evacuation System

  • Open Access

    ARTICLE

    Research on Evaluation of Multi-Timescale Flexibility and Energy Storage Deployment for the High-Penetration Renewable Energy of Power Systems

    Hongliang Wang1, Jiahua Hu1, Danhuang Dong1, Cenfeng Wang1, Feixia Tang2, Yizheng Wang1, Changsen Feng2,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.134, No.2, pp. 1137-1158, 2023, DOI:10.32604/cmes.2022.021965 - 31 August 2022

    Abstract With the rapid and wide deployment of renewable energy, the operations of the power system are facing greater challenges when dispatching flexible resources to keep power balance. The output power of renewable energy is uncertain, and thus flexible regulation for the power balance is highly demanded. Considering the multi-timescale output characteristics of renewable energy, a flexibility evaluation method based on multi-scale morphological decomposition and a multi-timescale energy storage deployment model based on bi-level decision-making are proposed in this paper. Through the multi-timescale decomposition algorithm on the basis of mathematical morphology, the multi-timescale components are separated More >

  • Open Access

    ARTICLE

    Numerical Simulation of Two-Phase Flow in Glutenite Reservoirs for Optimized Deployment in Horizontal Wells

    Yuhui Zhou1,2,3,*, Shichang Ju4, Qijun Lyu4, Hongfei Chen4, Xuebiao Du4, Aiping Zheng4, Wenshun Chen4, Ning Li4

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.1, pp. 245-259, 2023, DOI:10.32604/fdmp.2023.019971 - 02 August 2022

    Abstract It is known that the pore media characteristics of glutenite reservoirs are different from those of conventional sandstone reservoirs. Low reservoir permeability and naturally developed microfractures make water injection in this kind of reservoir very difficult. In this study, new exploitation methods are explored. Using a real glutenite reservoir as a basis, a three-dimensional fine geological model is elaborated. Then, combining the model with reservoir performance information, and through a historical fitting analysis, the saturation abundance distribution of remaining oil in the reservoir is determined. It is shown that, using this information, predictions can be More >

  • Open Access

    ARTICLE

    Intelligent Deployment Model for Target Coverage in Wireless Sensor Network

    K. Subramanian*, S. Shanmugavel

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 739-754, 2023, DOI:10.32604/iasc.2023.027248 - 06 June 2022

    Abstract Target coverage and continuous connection are the major recital factors for Wireless Sensor Network (WSN). Several previous research works studied various algorithms for target coverage difficulties; however they lacked to focus on improving the network’s life time in terms of energy. This research work mainly focuses on target coverage and area coverage problem in a heterogeneous WSN with increased network lifetime. The dynamic behavior of the target nodes is unpredictable, because the target nodes may move at any time in any direction of the network. Thus, target coverage becomes a major problem in WSN and… More >

  • Open Access

    ARTICLE

    Production Dynamic Prediction Method of Waterflooding Reservoir Based on Deep Convolution Generative Adversarial Network (DC-GAN)

    Liyuan Xin1,2,3, Xiang Rao1,2,3,*, Xiaoyin Peng1,2,3, Yunfeng Xu1,2,3, Jiating Chen1,2,3

    Energy Engineering, Vol.119, No.5, pp. 1905-1922, 2022, DOI:10.32604/ee.2022.019556 - 21 July 2022

    Abstract The rapid production dynamic prediction of water-flooding reservoirs based on well location deployment has been the basis of production optimization of water-flooding reservoirs. Considering that the construction of geological models with traditional numerical simulation software is complicated, the computational efficiency of the simulation calculation is often low, and the numerical simulation tools need to be repeated iteratively in the process of model optimization, machine learning methods have been used for fast reservoir simulation. However, traditional artificial neural network (ANN) has large degrees of freedom, slow convergence speed, and complex network model. This paper aims to… More >

  • Open Access

    ARTICLE

    Optimal Deployment of Heterogeneous Nodes to Enhance Network Invulnerability

    Qian Sun1,2, Fengbo Yang1,2, Xiaoyi Wang2,3,*, Jiping Xu1,2, Huiyan Zhang1,2, Li Wang1,2, Jiabin Yu1,2, Xiao Peng1,2, Ruichao Wang4

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 3081-3097, 2022, DOI:10.32604/cmc.2022.029366 - 16 June 2022

    Abstract Wireless sensor networks (WSN) can be used in many fields. In wireless sensor networks, sensor nodes transmit data in multi hop mode. The large number of hops required by data transmission will lead to unbalanced energy consumption and large data transmission delay of the whole network, which greatly affects the invulnerability of the network. Therefore, an optimal deployment of heterogeneous nodes (ODHN) algorithm is proposed to enhance the invulnerability of the wireless sensor networks. The algorithm combines the advantages of DEEC (design of distributed energy efficient clustering) clustering algorithm and BAS (beetle antenna search) optimization More >

  • Open Access

    ARTICLE

    Root-Of-Trust for Continuous Integration and Continuous Deployment Pipeline in Cloud Computing

    Abdul Saboor1,*, Mohd Fadzil Hassan2, Rehan Akbar1, Erwin Susanto3, Syed Nasir Mehmood Shah4, Muhammad Aadil Siddiqui5, Saeed Ahmed Magsi5

    CMC-Computers, Materials & Continua, Vol.73, No.2, pp. 2223-2239, 2022, DOI:10.32604/cmc.2022.028382 - 16 June 2022

    Abstract Cloud computing has gained significant use over the last decade due to its several benefits, including cost savings associated with setup, deployments, delivery, physical resource sharing across virtual machines, and availability of on-demand cloud services. However, in addition to usual threats in almost every computing environment, cloud computing has also introduced a set of new threats as consumers share physical resources due to the physical co-location paradigm. Furthermore, since there are a growing number of attacks directed at cloud environments (including dictionary attacks, replay code attacks, denial of service attacks, rootkit attacks, code injection attacks,… More >

Displaying 21-30 on page 3 of 44. Per Page