Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (92)
  • Open Access


    Intelligent Deer Hunting Optimization Based Grid Scheduling Scheme

    Mesfer Al Duhayyim1, Majdy M. Eltahir2, Imène Issaoui3, Fahd N. Al-Wesabi2,4, Anwer Mustafa Hilal5, Fuad Ali Mohammed Al-Yarimi2, Manar Ahmed Hamza5,*, Abu Sarwar Zamani5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 181-195, 2022, DOI:10.32604/cmc.2022.024206

    Abstract The grid environment is a dynamic, heterogeneous, and changeable computing system that distributes various services amongst different clients. To attain the benefits of collaborative resource sharing in Grid computing, a novel and proficient grid resource management system (RMS) is essential. Therefore, detection of an appropriate resource for the presented task is a difficult task. Several scientists have presented algorithms for mapping tasks to the resource. Few of them focus on fault tolerance, user fulfillment, and load balancing. With this motivation, this study designs an intelligent grid scheduling scheme using deer hunting optimization algorithm (DHOA), called More >

  • Open Access


    QoS in FANET Business and Swarm Data

    Jesús Hamilton Ortiz1, Carlos Andrés Tavera Romero2,*, Bazil Taha Ahmed3, Osamah Ibrahim Khalaf4

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1877-1899, 2022, DOI:10.32604/cmc.2022.023796

    Abstract This article shows the quality of services in a wireless swarm of drones that form an ad hoc network between them Fly Ad Hoc Networks (FANET). Each drone has the ability to send and receive information (like a router); and can behave as a hierarchical node whit the intregration of three protocols: Multiprotocol Label Switch (MPLS), Fast Hierarchical AD Hoc Mobile (FHAM) and Internet Protocol version 6 (IPv6), in conclusion MPLS + FHAM + IPv6. The metrics analyzed in the FANET are: delay, jitter, throughput, lost and sent packets/received. Testing process was carried out with… More >

  • Open Access


    Content Feature Extraction-based Hybrid Recommendation for Mobile Application Services

    Chao Ma1,*, Yinggang Sun1, Zhenguo Yang1, Hai Huang1, Dongyang Zhan2,3, Jiaxing Qu4

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 6201-6217, 2022, DOI:10.32604/cmc.2022.022717

    Abstract The number of mobile application services is showing an explosive growth trend, which makes it difficult for users to determine which ones are of interest. Especially, the new mobile application services are emerge continuously, most of them have not be rated when they need to be recommended to users. This is the typical problem of cold start in the field of collaborative filtering recommendation. This problem may makes it difficult for users to locate and acquire the services that they actually want, and the accuracy and novelty of service recommendations are also difficult to satisfy… More >

  • Open Access


    Deep Learning Based Intrusion Detection in Cloud Services for Resilience Management

    S. Sreenivasa Chakravarthi1,*, R. Jagadeesh Kannan2, V. Anantha Natarajan3, Xiao-Zhi Gao4

    CMC-Computers, Materials & Continua, Vol.71, No.3, pp. 5117-5133, 2022, DOI:10.32604/cmc.2022.022351

    Abstract In the global scenario one of the important goals for sustainable development in industrial field is innovate new technology, and invest in building infrastructure. All the developed and developing countries focus on building resilient infrastructure and promote sustainable developments by fostering innovation. At this juncture the cloud computing has become an important information and communication technologies model influencing sustainable development of the industries in the developing countries. As part of the innovations happening in the industrial sector, a new concept termed as ‘smart manufacturing’ has emerged, which employs the benefits of emerging technologies like internet… More >

  • Open Access


    Efficacy of a Community-Based Trauma Recovery Program after a Fire Disaster

    Yun-Jung Choi1, Mi-Ra Won2, Dong-Hee Cho1,*

    International Journal of Mental Health Promotion, Vol.24, No.1, pp. 85-94, 2022, DOI:10.32604/ijmhp.2022.018017

    Abstract As industries develop, fire disasters and their associated damage are increasing. Investigating the mental health of victims is imperative because this is an essential issue for community recovery after a disaster. This study was conducted to determine the efficacy of a program implemented by a community mental health center based on the investigation of the victims’ depression and post-traumatic stress disorder (PTSD) levels immediately after the disaster and at one-year follow-up. As a result, victims’ depression and PTSD recovered over time, and more changes were confirmed. In particular, the high-risk group for PTSD showed a More >

  • Open Access


    Intelligent Model for Predicting the Quality of Services Violation

    Muhammad Adnan Khan1,2, Asma Kanwal3, Sagheer Abbas3, Faheem Khan4, T. Whangbo4,*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3607-3619, 2022, DOI:10.32604/cmc.2022.023480

    Abstract Cloud computing is providing IT services to its customer based on Service level agreements (SLAs). It is important for cloud service providers to provide reliable Quality of service (QoS) and to maintain SLAs accountability. Cloud service providers need to predict possible service violations before the emergence of an issue to perform remedial actions for it. Cloud users’ major concerns; the factors for service reliability are based on response time, accessibility, availability, and speed. In this paper, we, therefore, experiment with the parallel mutant-Particle swarm optimization (PSO) for the detection and predictions of QoS violations in More >

  • Open Access


    Energy-Related Services as a Business: Eco-Transformation Logic to Support the Low-Carbon Transition

    Oleksandr Kovalko1, Tatiana Eutukhova2, Oleksandr Novoseltsev3,*

    Energy Engineering, Vol.119, No.1, pp. 103-121, 2022, DOI:10.32604/EE.2022.017709

    Abstract The transition to low-carbon development has been recognized as one of the most important directions for the transformation of national economies in most countries. Today we can identify two of the most common service-oriented logical models of this transition. These are models of Service-Dominant Logic and Product-Service Systems that are used in this study to create a service-oriented platform for stimulating business development in the field of energy-related (ER) services. The establishment of such a platform is being considered based on the conceptual provisions of the global business ecosystem. Such a platform has been found… More >

  • Open Access


    Interactive Middleware Services for Heterogeneous Systems

    Vasanthi Raghupathy1,*, Osamah Ibrahim Khalaf2, Carlos Andrés Tavera Romero3, Sudhakar Sengan4, Dilip Kumar Sharma5

    Computer Systems Science and Engineering, Vol.41, No.3, pp. 1241-1253, 2022, DOI:10.32604/csse.2022.021997

    Abstract Computing has become more invisible, widespread and ubiquitous since the inception of the Internet of Things (IoT) and Web of Things. Multiple devices that surround us meet user’s requirements everywhere. Multiple Middleware Framework (MF) designs have come into existence because of the rapid development of interactive services in Heterogeneous Systems. This resulted in the delivery of interactive services throughout Heterogeneous Environments (HE). Users are given free navigation between devices in a widespread environment and continuously interact with each other from any chosen device. Numerous interactive devices with recent interactive platforms (for example, Smart Phones, Mobile… More >

  • Open Access


    DDoS Detection in SDN using Machine Learning Techniques

    Muhammad Waqas Nadeem, Hock Guan Goh*, Vasaki Ponnusamy, Yichiet Aun

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 771-789, 2022, DOI:10.32604/cmc.2022.021669

    Abstract Software-defined network (SDN) becomes a new revolutionary paradigm in networks because it provides more control and network operation over a network infrastructure. The SDN controller is considered as the operating system of the SDN based network infrastructure, and it is responsible for executing the different network applications and maintaining the network services and functionalities. Despite all its tremendous capabilities, the SDN face many security issues due to the complexity of the SDN architecture. Distributed denial of services (DDoS) is a common attack on SDN due to its centralized architecture, especially at the control layer of… More >

  • Open Access


    Automatic License Plate Recognition System for Vehicles Using a CNN

    Parneet Kaur1, Yogesh Kumar1, Shakeel Ahmed2,*, Abdulaziz Alhumam2, Ruchi Singla3, Muhammad Fazal Ijaz4

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 35-50, 2022, DOI:10.32604/cmc.2022.017681

    Abstract Automatic License Plate Recognition (ALPR) systems are important in Intelligent Transportation Services (ITS) as they help ensure effective law enforcement and security. These systems play a significant role in border surveillance, ensuring safeguards, and handling vehicle-related crime. The most effective approach for implementing ALPR systems utilizes deep learning via a convolutional neural network (CNN). A CNN works on an input image by assigning significance to various features of the image and differentiating them from each other. CNNs are popular for license plate character recognition. However, little has been reported on the results of these systems with More >

Displaying 31-40 on page 4 of 92. Per Page