Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (60)
  • Open Access

    ARTICLE

    Monarch Butterfly Optimization for Reliable Scheduling in Cloud

    B. Gomathi1, S. T. Suganthi2,*, Karthikeyan Krishnasamy3, J. Bhuvana4

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3693-3710, 2021, DOI:10.32604/cmc.2021.018159 - 24 August 2021

    Abstract Enterprises have extensively taken on cloud computing environment since it provides on-demand virtualized cloud application resources. The scheduling of the cloud tasks is a well-recognized NP-hard problem. The Task scheduling problem is convoluted while convincing different objectives, which are dispute in nature. In this paper, Multi-Objective Improved Monarch Butterfly Optimization (MOIMBO) algorithm is applied to solve multi-objective task scheduling problems in the cloud in preparation for Pareto optimal solutions. Three different dispute objectives, such as makespan, reliability, and resource utilization, are deliberated for task scheduling problems.The Epsilon-fuzzy dominance sort method is utilized in the multi-objective More >

  • Open Access

    ARTICLE

    A Compromise Programming to Task Assignment Problem in Software Development Project

    Ngo Tung Son1,2,*, Jafreezal Jaafar1, Izzatdin Abdul Aziz1, Bui Ngoc Anh2, Hoang Duc Binh2, Muhammad Umar Aftab3

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3429-3444, 2021, DOI:10.32604/cmc.2021.017710 - 24 August 2021

    Abstract The scheduling process that aims to assign tasks to members is a difficult job in project management. It plays a prerequisite role in determining the project’s quality and sometimes winning the bidding process. This study aims to propose an approach based on multi-objective combinatorial optimization to do this automatically. The generated schedule directs the project to be completed with the shortest critical path, at the minimum cost, while maintaining its quality. There are several real-world business constraints related to human resources, the similarity of the tasks added to the optimization model, and the literature’s traditional… More >

  • Open Access

    ARTICLE

    Task Allocation Approach for Minimizing Make-Span in Wireless Sensor Actor Networks

    Mohammad Reza Okhovvat1, Mohammad Taghi Kheirabadi1,*, Ali Nodehi1, Morteza Okhovvat2

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 165-178, 2021, DOI:10.32604/csse.2021.05468 - 20 July 2021

    Abstract Wireless Sensor Actor Networks (WSANs) have contributed to the development of pervasive computing wherein time consideration to perform the tasks of pervasive applications is necessary. Hence, time constraint is one of the major challenges of WSANs. In this paper, we propose an analytical approach based on queuing theory to minimize the total time taken for completion of tasks, i.e., make-span, in WSANs with hybrid architecture. The best allocation rates of tasks to actor nodes are figured out through solving inequities and qualities resulting from a steady state analysis of the proposed model. Applying the calculated… More >

  • Open Access

    REVIEW

    The bacteriophage mu lysis system–A new mechanism of host lysis?

    SAIKAT SAMANTA1,#, ASHISH RANJAN SHARMA2,#, ABINIT SAHA1, MANOJ KUMAR SINGH1, ARPITA DAS1, MANOJIT BHATTACHARYA3, RUDRA PRASAD SAHA1,*, SANG-SOO LEE2,*, CHIRANJIB CHAKRABORTY1,*

    BIOCELL, Vol.45, No.5, pp. 1175-1186, 2021, DOI:10.32604/biocell.2021.015537 - 12 July 2021

    Abstract Bacteriophages are viruses that infect bacteria and can choose any one of the two alternative pathways for infection, i.e., lysis or lysogeny. Phage lysis is one of the conventional biological processes required to spread infection from one bacterium to another. Our analysis suggests that in the paradigm bacteriophage Mu, six proteins might be involved in host cell lysis. Mu has a broad host range, and Mu-like phages were found in both Gram-negative and Gram-positive bacteria. An analysis of the genomes of Mu and Mu-like phages could be useful in elucidating the lysis mechanism in this… More >

  • Open Access

    ARTICLE

    Fault Aware Dynamic Resource Manager for Fault Recognition and Avoidance in Cloud

    Nandhini Jembu Mohanram1,2,*, Gnanasekaran Thangavel3, N. M. Jothi Swaroopan4

    Computer Systems Science and Engineering, Vol.38, No.2, pp. 215-228, 2021, DOI:10.32604/csse.2021.015027 - 23 April 2021

    Abstract Fault tolerance (FT) schemes are intended to work on a minimized and static amount of physical resources. When a host failure occurs, the conventional FT frequently proceeds with the execution on the accessible working hosts. This methodology saves the execution state and applications to complete without disruption. However, the dynamicity of open cloud assets is not seen when taking scheduling choices. Existing optimization techniques are intended in dealing with resource scheduling. This method will be utilized for distributing the approaching tasks to the VMs. However, the dynamic scheduling for this procedure doesn’t accomplish the objective… More >

  • Open Access

    ARTICLE

    Maximum Probabilistic and Dynamic Traffic Load Effects on Short-to-Medium Span Bridges

    Naiwei Lu1,*, Honghao Wang1, Kai Wang1, Yang Liu2

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.1, pp. 345-360, 2021, DOI:10.32604/cmes.2021.013792 - 30 March 2021

    Abstract The steadily growing traffic load has resulted in lots of bridge collapse events over the past decades, especially for short-to-medium span bridges. This study investigated probabilistic and dynamic traffic load effects on short-to-medium span bridges using practical heavy traffic data in China. Mathematical formulations for traffic-bridge coupled vibration and probabilistic extrapolation were derived. A framework for extrapolating probabilistic and dynamic traffic load effect was presented to conduct an efficient and accurate extrapolation. An equivalent dynamic wheel load model was demonstrated to be feasible for short-to-medium span bridges. Numerical studies of two types of simply-supported bridges… More >

  • Open Access

    ARTICLE

    Data Fusion about Serviceability Reliability Prediction for the Long-Span Bridge Girder Based on MBDLM and Gaussian Copula Technique

    Xueping Fan*, Guanghong Yang, Zhipeng Shang, Xiaoxiong Zhao, Yuefei Liu*

    Structural Durability & Health Monitoring, Vol.15, No.1, pp. 69-83, 2021, DOI:10.32604/sdhm.2021.011922 - 22 March 2021

    Abstract This article presented a new data fusion approach for reasonably predicting dynamic serviceability reliability of the long-span bridge girder. Firstly, multivariate Bayesian dynamic linear model (MBDLM) considering dynamic correlation among the multiple variables is provided to predict dynamic extreme deflections; secondly, with the proposed MBDLM, the dynamic correlation coefficients between any two performance functions can be predicted; finally, based on MBDLM and Gaussian copula technique, a new data fusion method is given to predict the serviceability reliability of the long-span bridge girder, and the monitoring extreme deflection data from an actual bridge is provided to More >

  • Open Access

    ARTICLE

    A Knowledge-Enriched and Span-Based Network for Joint Entity and Relation Extraction

    Kun Ding1, Shanshan Liu1, Yuhao Zhang2, Hui Zhang1, Xiaoxiong Zhang1,*, Tongtong Wu2,3, Xiaolei Zhou1

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 377-389, 2021, DOI:10.32604/cmc.2021.016301 - 22 March 2021

    Abstract The joint extraction of entities and their relations from certain texts plays a significant role in most natural language processes. For entity and relation extraction in a specific domain, we propose a hybrid neural framework consisting of two parts: a span-based model and a graph-based model. The span-based model can tackle overlapping problems compared with BILOU methods, whereas the graph-based model treats relation prediction as graph classification. Our main contribution is to incorporate external lexical and syntactic knowledge of a specific domain, such as domain dictionaries and dependency structures from texts, into end-to-end neural models. More >

  • Open Access

    ARTICLE

    Multi-Span and Multiple Relevant Time Series Prediction Based on Neighborhood Rough Set

    Xiaoli Li1, Shuailing Zhou1, Zixu An2,*, Zhenlong Du1

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 3765-3780, 2021, DOI:10.32604/cmc.2021.012422 - 01 March 2021

    Abstract Rough set theory has been widely researched for time series prediction problems such as rainfall runoff. Accurate forecasting of rainfall runoff is a long standing but still mostly significant problem for water resource planning and management, reservoir and river regulation. Most research is focused on constructing the better model for improving prediction accuracy. In this paper, a rainfall runoff forecast model based on the variable-precision fuzzy neighborhood rough set (VPFNRS) is constructed to predict Watershed runoff value. Fuzzy neighborhood rough set define the fuzzy decision of a sample by using the concept of fuzzy neighborhood.… More >

  • Open Access

    ARTICLE

    Optimal Resource Allocation and Quality of Service Prediction in Cloud

    Priya Baldoss1,2,*, Gnanasekaran Thangavel3

    CMC-Computers, Materials & Continua, Vol.67, No.1, pp. 253-265, 2021, DOI:10.32604/cmc.2021.013695 - 12 January 2021

    Abstract In the present scenario, cloud computing service provides on-request access to a collection of resources available in remote system that can be shared by numerous clients. Resources are in self-administration; consequently, clients can adjust their usage according to their requirements. Resource usage is estimated and clients can pay according to their utilization. In literature, the existing method describes the usage of various hardware assets. Quality of Service (QoS) needs to be considered for ascertaining the schedule and the access of resources. Adhering with the security arrangement, any additional code is forbidden to ensure the usage… More >

Displaying 41-50 on page 5 of 60. Per Page