Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (45)
  • Open Access

    ARTICLE

    Comparative Study on Various Strength Parameters of Structural Elements Made from Cross-Laminated Timber

    Mohammad Anwar-Us-Saadat1, Janeshka Goonewardena2, Bidur Kafle2, Mahmud Ashraf2,*, Mahbube Subhani2

    Journal of Renewable Materials, Vol.10, No.6, pp. 1575-1606, 2022, DOI:10.32604/jrm.2022.018919

    Abstract Cross laminated timber (CLT) is an innovative and environment friendly engineered timber product with superior structural performance. CLT offers strong resistance against both in-plane and out-of-plane loading. Hence, it is widely used as floors, roofs or wall elements. Considerable experimental research on CLT under various loading conditions has been done in the recent past. This article presents a comprehensive review of various design methods to determine basic mechanical properties such as tension, compression and rolling shear strength of CLT with primary focus on Norway spruce. All relevant experimental data available from existing literature were collated and consequently been used to… More >

  • Open Access

    ARTICLE

    An Experimental Simulation of Addressing Auto-Configuration Issues for Wireless Sensor Networks

    Idrees Sarhan Kocher*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3821-3838, 2022, DOI:10.32604/cmc.2022.023478

    Abstract Applications of Wireless Sensor devices are widely used by various monitoring sections such as environmental monitoring, industrial sensing, habitat modeling, healthcare and enemy movement detection systems. Researchers were found that 16 bytes packet size (payload) requires Media Access Control (MAC) and globally unique network addresses overheads as more as the payload itself which is not reasonable in most situations. The approach of using a unique address isn't preferable for most Wireless Sensor Networks (WSNs) applications as well. Based on the mentioned drawbacks, the current work aims to fill the existing gap in the field area by providing two strategies. First,… More >

  • Open Access

    ARTICLE

    Hybrid Cuckoo Search Algorithm for Scheduling in Cloud Computing

    Manoj Kumar*, Suman

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1641-1660, 2022, DOI:10.32604/cmc.2022.021793

    Abstract Cloud computing has gained widespread popularity over the last decade. Scheduling problem in cloud computing is prejudiced due to enormous demands of cloud users. Meta-heuristic techniques in cloud computing have exhibited high performance in comparison to traditional scheduling algorithms. This paper presents a novel hybrid Nesterov Accelerated Gradient-based Cuckoo Search Algorithm (NAGCSA) to address the scheduling issue in cloud computing. Nesterov Accelerated Gradient can address trapping at local minima in CSA by updating the position using future approximation. The local search in the proposed algorithm is performed by using Nesterov Accelerated Gradient, while the global search is performed by using… More >

  • Open Access

    ARTICLE

    A Hybrid Model for Reliability Aware and Energy-Efficiency in Multicore Systems

    Samar Nour1,*, Sameh A. Salem1,2, Shahira M. Habashy1

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4447-4466, 2022, DOI:10.32604/cmc.2022.020775

    Abstract Recently, Multicore systems use Dynamic Voltage/Frequency Scaling (DV/FS) technology to allow the cores to operate with various voltage and/or frequencies than other cores to save power and enhance the performance. In this paper, an effective and reliable hybrid model to reduce the energy and makespan in multicore systems is proposed. The proposed hybrid model enhances and integrates the greedy approach with dynamic programming to achieve optimal Voltage/Frequency (Vmin/F) levels. Then, the allocation process is applied based on the available workloads. The hybrid model consists of three stages. The first stage gets the optimum safe voltage while the second stage sets… More >

  • Open Access

    ARTICLE

    Analyzing the Data of Software Security Life-Span: Quantum Computing Era

    Hashem Alyami1, Mohd Nadeem2, Wael Alosaimi3, Abdullah Alharbi3, Rajeev Kumar4,*, Bineet Kumar Gupta4, Alka Agrawal2, Raees Ahmad Khan2

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 707-716, 2022, DOI:10.32604/iasc.2022.020780

    Abstract Software or web application security is the main objective in the era of Information Technology (IT) and Artificial Intelligence (AI). Distinguishing proof of security at the initial stage produces significant results to comprehend the administration of security relics for best potential outcomes. A security alternative gives several methods and algorithms to ensure the software security. Security estimation is the vital factor in assessing, administrating, controlling security to improve the nature of security. It is to be realized that assessment of security at early stage of development helps in identifying distinctive worms, dangers, weaknesses and threats. This paper will talk about… More >

  • Open Access

    ARTICLE

    Scheduling Flexible Flow Shop in Labeling Companies to Minimize the Makespan

    Chia-Nan Wang1, Hsien-Pin Hsu2, Hsin-Pin Fu3,*, Nguyen Ky Phuc Phan4, Van Thanh Nguyen5

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 17-36, 2022, DOI:10.32604/csse.2022.016992

    Abstract In the competitive global marketplace, production scheduling plays a vital role in planning in manufacturing. Scheduling deals directly with the time to output products quickly and with a low production cost. This research examines case study of a Radio-Frequency Identification labeling department at Avery Dennison. The main objective of the company is to have a method that allows for the sequencing and scheduling of a set of jobs so it can be completed on or before the customer’s due date to minimize the number of late orders. This study analyzes the flexible flow shop scheduling problem with a sequence dependent… More >

  • Open Access

    ARTICLE

    Monarch Butterfly Optimization for Reliable Scheduling in Cloud

    B. Gomathi1, S. T. Suganthi2,*, Karthikeyan Krishnasamy3, J. Bhuvana4

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3693-3710, 2021, DOI:10.32604/cmc.2021.018159

    Abstract Enterprises have extensively taken on cloud computing environment since it provides on-demand virtualized cloud application resources. The scheduling of the cloud tasks is a well-recognized NP-hard problem. The Task scheduling problem is convoluted while convincing different objectives, which are dispute in nature. In this paper, Multi-Objective Improved Monarch Butterfly Optimization (MOIMBO) algorithm is applied to solve multi-objective task scheduling problems in the cloud in preparation for Pareto optimal solutions. Three different dispute objectives, such as makespan, reliability, and resource utilization, are deliberated for task scheduling problems.The Epsilon-fuzzy dominance sort method is utilized in the multi-objective domain to elect the foremost… More >

  • Open Access

    ARTICLE

    A Compromise Programming to Task Assignment Problem in Software Development Project

    Ngo Tung Son1,2,*, Jafreezal Jaafar1, Izzatdin Abdul Aziz1, Bui Ngoc Anh2, Hoang Duc Binh2, Muhammad Umar Aftab3

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3429-3444, 2021, DOI:10.32604/cmc.2021.017710

    Abstract The scheduling process that aims to assign tasks to members is a difficult job in project management. It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process. This study aims to propose an approach based on multi-objective combinatorial optimization to do this automatically. The generated schedule directs the project to be completed with the shortest critical path, at the minimum cost, while maintaining its quality. There are several real-world business constraints related to human resources, the similarity of the tasks added to the optimization model, and the literature’s traditional rules. To support the decision-maker… More >

  • Open Access

    ARTICLE

    Task Allocation Approach for Minimizing Make-Span in Wireless Sensor Actor Networks

    Mohammad Reza Okhovvat1, Mohammad Taghi Kheirabadi1,*, Ali Nodehi1, Morteza Okhovvat2

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 165-178, 2021, DOI:10.32604/csse.2021.05468

    Abstract Wireless Sensor Actor Networks (WSANs) have contributed to the development of pervasive computing wherein time consideration to perform the tasks of pervasive applications is necessary. Hence, time constraint is one of the major challenges of WSANs. In this paper, we propose an analytical approach based on queuing theory to minimize the total time taken for completion of tasks, i.e., make-span, in WSANs with hybrid architecture. The best allocation rates of tasks to actor nodes are figured out through solving inequities and qualities resulting from a steady state analysis of the proposed model. Applying the calculated tasks arrival rates at each… More >

  • Open Access

    REVIEW

    The bacteriophage mu lysis system–A new mechanism of host lysis?

    SAIKAT SAMANTA1,#, ASHISH RANJAN SHARMA2,#, ABINIT SAHA1, MANOJ KUMAR SINGH1, ARPITA DAS1, MANOJIT BHATTACHARYA3, RUDRA PRASAD SAHA1,*, SANG-SOO LEE2,*, CHIRANJIB CHAKRABORTY1,*

    BIOCELL, Vol.45, No.5, pp. 1175-1186, 2021, DOI:10.32604/biocell.2021.015537

    Abstract Bacteriophages are viruses that infect bacteria and can choose any one of the two alternative pathways for infection, i.e., lysis or lysogeny. Phage lysis is one of the conventional biological processes required to spread infection from one bacterium to another. Our analysis suggests that in the paradigm bacteriophage Mu, six proteins might be involved in host cell lysis. Mu has a broad host range, and Mu-like phages were found in both Gram-negative and Gram-positive bacteria. An analysis of the genomes of Mu and Mu-like phages could be useful in elucidating the lysis mechanism in this group of phages. A detailed… More >

Displaying 21-30 on page 3 of 45. Per Page