Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (60)
  • Open Access

    ARTICLE

    Attention Weight is Indispensable in Joint Entity and Relation Extraction

    Jianquan Ouyang1,*, Jing Zhang1, Tianming Liu2

    Intelligent Automation & Soft Computing, Vol.34, No.3, pp. 1707-1723, 2022, DOI:10.32604/iasc.2022.028352 - 25 May 2022

    Abstract Joint entity and relation extraction (JERE) is an important foundation for unstructured knowledge extraction in natural language processing (NLP). Thus, designing efficient algorithms for it has become a vital task. Although existing methods can efficiently extract entities and relations, their performance should be improved. In this paper, we propose a novel model called Attention and Span-based Entity and Relation Transformer (ASpERT) for JERE. First, differing from the traditional approach that only considers the last hidden layer as the feature embedding, ASpERT concatenates the attention head information of each layer with the information of the last… More >

  • Open Access

    ARTICLE

    Hybrid Invasive Weed Improved Grasshopper Optimization Algorithm for Cloud Load Balancing

    K. Naveen Durai*, R. Subha, Anandakumar Haldorai

    Intelligent Automation & Soft Computing, Vol.34, No.1, pp. 467-483, 2022, DOI:10.32604/iasc.2022.026020 - 15 April 2022

    Abstract In cloud computing, the processes of load balancing and task scheduling are major concerns as they are the primary mechanisms responsible for executing tasks by allocating and utilizing the resources of Virtual Machines (VMs) in a more optimal way. This problem of balancing loads and scheduling tasks in the cloud computing scenario can be categorized as an NP-hard problem. This problem of load balancing needs to be efficiently allocated tasks to VMs and sustain the trade-off among the complete set of VMs. It also needs to maintain equilibrium among VMs with the objective of maximizing… More >

  • Open Access

    ARTICLE

    Intelligent Deer Hunting Optimization Based Grid Scheduling Scheme

    Mesfer Al Duhayyim1, Majdy M. Eltahir2, Imène Issaoui3, Fahd N. Al-Wesabi2,4, Anwer Mustafa Hilal5, Fuad Ali Mohammed Al-Yarimi2, Manar Ahmed Hamza5,*, Abu Sarwar Zamani5

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 181-195, 2022, DOI:10.32604/cmc.2022.024206 - 24 February 2022

    Abstract The grid environment is a dynamic, heterogeneous, and changeable computing system that distributes various services amongst different clients. To attain the benefits of collaborative resource sharing in Grid computing, a novel and proficient grid resource management system (RMS) is essential. Therefore, detection of an appropriate resource for the presented task is a difficult task. Several scientists have presented algorithms for mapping tasks to the resource. Few of them focus on fault tolerance, user fulfillment, and load balancing. With this motivation, this study designs an intelligent grid scheduling scheme using deer hunting optimization algorithm (DHOA), called More >

  • Open Access

    ARTICLE

    Cost Effective Optimal Task Scheduling Model in Hybrid Cloud Environment

    M. Manikandan1,*, R. Subramanian2, M. S. Kavitha3, S. Karthik3

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 935-948, 2022, DOI:10.32604/csse.2022.021816 - 08 February 2022

    Abstract In today’s world, Cloud Computing (CC) enables the users to access computing resources and services over cloud without any need to own the infrastructure. Cloud Computing is a concept in which a network of devices, located in remote locations, is integrated to perform operations like data collection, processing, data profiling and data storage. In this context, resource allocation and task scheduling are important processes which must be managed based on the requirements of a user. In order to allocate the resources effectively, hybrid cloud is employed since it is a capable solution to process large-scale… More >

  • Open Access

    ARTICLE

    Comparative Study on Various Strength Parameters of Structural Elements Made from Cross-Laminated Timber

    Mohammad Anwar-Us-Saadat1, Janeshka Goonewardena2, Bidur Kafle2, Mahmud Ashraf2,*, Mahbube Subhani2

    Journal of Renewable Materials, Vol.10, No.6, pp. 1575-1606, 2022, DOI:10.32604/jrm.2022.018919 - 20 January 2022

    Abstract Cross laminated timber (CLT) is an innovative and environment friendly engineered timber product with superior structural performance. CLT offers strong resistance against both in-plane and out-of-plane loading. Hence, it is widely used as floors, roofs or wall elements. Considerable experimental research on CLT under various loading conditions has been done in the recent past. This article presents a comprehensive review of various design methods to determine basic mechanical properties such as tension, compression and rolling shear strength of CLT with primary focus on Norway spruce. All relevant experimental data available from existing literature were collated More >

  • Open Access

    ARTICLE

    An Experimental Simulation of Addressing Auto-Configuration Issues for Wireless Sensor Networks

    Idrees Sarhan Kocher*

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 3821-3838, 2022, DOI:10.32604/cmc.2022.023478 - 07 December 2021

    Abstract Applications of Wireless Sensor devices are widely used by various monitoring sections such as environmental monitoring, industrial sensing, habitat modeling, healthcare and enemy movement detection systems. Researchers were found that 16 bytes packet size (payload) requires Media Access Control (MAC) and globally unique network addresses overheads as more as the payload itself which is not reasonable in most situations. The approach of using a unique address isn't preferable for most Wireless Sensor Networks (WSNs) applications as well. Based on the mentioned drawbacks, the current work aims to fill the existing gap in the field area… More >

  • Open Access

    ARTICLE

    Hybrid Cuckoo Search Algorithm for Scheduling in Cloud Computing

    Manoj Kumar*, Suman

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 1641-1660, 2022, DOI:10.32604/cmc.2022.021793 - 03 November 2021

    Abstract Cloud computing has gained widespread popularity over the last decade. Scheduling problem in cloud computing is prejudiced due to enormous demands of cloud users. Meta-heuristic techniques in cloud computing have exhibited high performance in comparison to traditional scheduling algorithms. This paper presents a novel hybrid Nesterov Accelerated Gradient-based Cuckoo Search Algorithm (NAGCSA) to address the scheduling issue in cloud computing. Nesterov Accelerated Gradient can address trapping at local minima in CSA by updating the position using future approximation. The local search in the proposed algorithm is performed by using Nesterov Accelerated Gradient, while the global More >

  • Open Access

    ARTICLE

    A Hybrid Model for Reliability Aware and Energy-Efficiency in Multicore Systems

    Samar Nour1,*, Sameh A. Salem1,2, Shahira M. Habashy1

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4447-4466, 2022, DOI:10.32604/cmc.2022.020775 - 11 October 2021

    Abstract Recently, Multicore systems use Dynamic Voltage/Frequency Scaling (DV/FS) technology to allow the cores to operate with various voltage and/or frequencies than other cores to save power and enhance the performance. In this paper, an effective and reliable hybrid model to reduce the energy and makespan in multicore systems is proposed. The proposed hybrid model enhances and integrates the greedy approach with dynamic programming to achieve optimal Voltage/Frequency (Vmin/F) levels. Then, the allocation process is applied based on the available workloads. The hybrid model consists of three stages. The first stage gets the optimum safe voltage More >

  • Open Access

    ARTICLE

    Analyzing the Data of Software Security Life-Span: Quantum Computing Era

    Hashem Alyami1, Mohd Nadeem2, Wael Alosaimi3, Abdullah Alharbi3, Rajeev Kumar4,*, Bineet Kumar Gupta4, Alka Agrawal2, Raees Ahmad Khan2

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 707-716, 2022, DOI:10.32604/iasc.2022.020780 - 22 September 2021

    Abstract Software or web application security is the main objective in the era of Information Technology (IT) and Artificial Intelligence (AI). Distinguishing proof of security at the initial stage produces significant results to comprehend the administration of security relics for best potential outcomes. A security alternative gives several methods and algorithms to ensure the software security. Security estimation is the vital factor in assessing, administrating, controlling security to improve the nature of security. It is to be realized that assessment of security at early stage of development helps in identifying distinctive worms, dangers, weaknesses and threats.… More >

  • Open Access

    ARTICLE

    Scheduling Flexible Flow Shop in Labeling Companies to Minimize the Makespan

    Chia-Nan Wang1, Hsien-Pin Hsu2, Hsin-Pin Fu3,*, Nguyen Ky Phuc Phan4, Van Thanh Nguyen5

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 17-36, 2022, DOI:10.32604/csse.2022.016992 - 26 August 2021

    Abstract In the competitive global marketplace, production scheduling plays a vital role in planning in manufacturing. Scheduling deals directly with the time to output products quickly and with a low production cost. This research examines case study of a Radio-Frequency Identification labeling department at Avery Dennison. The main objective of the company is to have a method that allows for the sequencing and scheduling of a set of jobs so it can be completed on or before the customer’s due date to minimize the number of late orders. This study analyzes the flexible flow shop scheduling More >

Displaying 31-40 on page 4 of 60. Per Page