Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (24)
  • Open Access

    ARTICLE

    Improving Network Availability through Optimized Multipath Routing and Incremental Deployment Strategies

    Wei Zhang1, Haijun Geng2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 427-448, 2024, DOI:10.32604/cmc.2024.051871

    Abstract Currently, distributed routing protocols are constrained by offering a single path between any pair of nodes, thereby limiting the potential throughput and overall network performance. This approach not only restricts the flow of data but also makes the network susceptible to failures in case the primary path is disrupted. In contrast, routing protocols that leverage multiple paths within the network offer a more resilient and efficient solution. Multipath routing, as a fundamental concept, surpasses the limitations of traditional shortest path first protocols. It not only redirects traffic to unused resources, effectively mitigating network congestion, but… More >

  • Open Access

    ARTICLE

    Belowground Bud Bank Is Insensitive to Short-Term Nutrient Addition in the Meadow Steppe of Inner Mongolia

    Jin Tao1, Jiatai Tian1, Dongmei Li1, Jinlei Zhu2, Qun Ma3, Zhiming Zhang1, Jungang Chen4, Yipeng Liu5, Jianqiang Qian1,*

    Phyton-International Journal of Experimental Botany, Vol.93, No.6, pp. 1129-1141, 2024, DOI:10.32604/phyton.2024.051405

    Abstract Human activities and industrialization have significantly increased soil nutrients, such as nitrogen (N) and phosphorus (P), profoundly impacting the composition and structure of plant community, as well as the ecosystem functions, especially in nutrient-limited ecosystems. However, as the key propagule pool of perennial grasslands, how belowground bud bank and its relationship with aboveground vegetation respond to short-term changes in soil nutrients was still unclear. In this study, we conducted a short-term (2021–2022) soil fertilization experiment with N addition (10 g N m yr) and P addition (5 g N m yr) in the meadow steppe… More >

  • Open Access

    ARTICLE

    An Innovative K-Anonymity Privacy-Preserving Algorithm to Improve Data Availability in the Context of Big Data

    Linlin Yuan1,2, Tiantian Zhang1,3, Yuling Chen1,*, Yuxiang Yang1, Huang Li1

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1561-1579, 2024, DOI:10.32604/cmc.2023.046907

    Abstract The development of technologies such as big data and blockchain has brought convenience to life, but at the same time, privacy and security issues are becoming more and more prominent. The K-anonymity algorithm is an effective and low computational complexity privacy-preserving algorithm that can safeguard users’ privacy by anonymizing big data. However, the algorithm currently suffers from the problem of focusing only on improving user privacy while ignoring data availability. In addition, ignoring the impact of quasi-identified attributes on sensitive attributes causes the usability of the processed data on statistical analysis to be reduced. Based… More >

  • Open Access

    ARTICLE

    Reliability-Based Model for Incomplete Preventive Replacement Maintenance of Photovoltaic Power Systems

    Wei Chen, Ming Li*, Tingting Pei, Cunyu Sun, Huan Lei

    Energy Engineering, Vol.121, No.1, pp. 125-144, 2024, DOI:10.32604/ee.2023.042812

    Abstract At present, the operation and maintenance of photovoltaic power generation systems mainly comprise regular maintenance, breakdown maintenance, and condition-based maintenance, which is very likely to lead to over- or under-repair of equipment. Therefore, a preventive maintenance and replacement strategy for PV power generation systems based on reliability as a constraint is proposed. First, a hybrid failure function with a decreasing service age factor and an increasing failure rate factor is introduced to describe the deterioration of PV power generation equipment, and the equipment is replaced when its reliability drops to the replacement threshold in the… More >

  • Open Access

    ARTICLE

    Performance Improvement through Novel Adaptive Node and Container Aware Scheduler with Resource Availability Control in Hadoop YARN

    J. S. Manjaly, T. Subbulakshmi*

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 3083-3108, 2023, DOI:10.32604/csse.2023.036320

    Abstract The default scheduler of Apache Hadoop demonstrates operational inefficiencies when connecting external sources and processing transformation jobs. This paper has proposed a novel scheduler for enhancement of the performance of the Hadoop Yet Another Resource Negotiator (YARN) scheduler, called the Adaptive Node and Container Aware Scheduler (ANACRAC), that aligns cluster resources to the demands of the applications in the real world. The approach performs to leverage the user-provided configurations as a unique design to apportion nodes, or containers within the nodes, to application thresholds. Additionally, it provides the flexibility to the applications for selecting and… More >

  • Open Access

    ARTICLE

    Intrusion Detection in 5G Cellular Network Using Machine Learning

    Ishtiaque Mahmood1, Tahir Alyas2, Sagheer Abbas3, Tariq Shahzad4, Qaiser Abbas5,6, Khmaies Ouahada7,*

    Computer Systems Science and Engineering, Vol.47, No.2, pp. 2439-2453, 2023, DOI:10.32604/csse.2023.033842

    Abstract Attacks on fully integrated servers, apps, and communication networks via the Internet of Things (IoT) are growing exponentially. Sensitive devices’ effectiveness harms end users, increases cyber threats and identity theft, raises costs, and negatively impacts income as problems brought on by the Internet of Things network go unnoticed for extended periods. Attacks on Internet of Things interfaces must be closely monitored in real time for effective safety and security. Following the 1, 2, 3, and 4G cellular networks, the 5th generation wireless 5G network is indeed the great invasion of mankind and is known as… More >

  • Open Access

    ARTICLE

    Efficient Heuristic Replication Techniques for High Data Availability in Cloud

    H. L. Chandrakala1,*, R. Loganathan2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 3151-3164, 2023, DOI:10.32604/csse.2022.027873

    Abstract Most social networks allow connections amongst many people based on shared interests. Social networks have to offer shared data like videos, photos with minimum latency to the group, which could be challenging as the storage cost has to be minimized and hence entire data replication is not a solution. The replication of data across a network of read-intensive can potentially lead to increased savings in cost and energy and reduce the end-user’s response time. Though simple and adaptive replication strategies exist, the solution is non-deterministic; the replicas of the data need to be optimized to… More >

  • Open Access

    ARTICLE

    Health Data Availability Protection: Delta-XOR-Relay Data Update in Erasure-Coded Cloud Storage Systems

    Yifei Xiao, Shijie Zhou*

    CMES-Computer Modeling in Engineering & Sciences, Vol.135, No.1, pp. 169-185, 2023, DOI:10.32604/cmes.2022.021795

    Abstract To achieve the high availability of health data in erasure-coded cloud storage systems, the data update performance in erasure coding should be continuously optimized. However, the data update performance is often bottlenecked by the constrained cross-rack bandwidth. Various techniques have been proposed in the literature to improve network bandwidth efficiency, including delta transmission, relay, and batch update. These techniques were largely proposed individually previously, and in this work, we seek to use them jointly. To mitigate the cross-rack update traffic, we propose DXR-DU which builds on four valuable techniques: (i) delta transmission, (ii) XOR-based data More >

  • Open Access

    ARTICLE

    Availability Capacity Evaluation and Reliability Assessment of Integrated Systems Using Metaheuristic Algorithm

    A. Durgadevi*, N. Shanmugavadivoo

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 1951-1971, 2023, DOI:10.32604/csse.2023.026810

    Abstract

    Contemporarily, the development of distributed generations (DGs) technologies is fetching more, and their deployment in power systems is becoming broad and diverse. Consequently, several glitches are found in the recent studies due to the inappropriate/inadequate penetrations. This work aims to improve the reliable operation of the power system employing reliability indices using a metaheuristic-based algorithm before and after DGs penetration with feeder system. The assessment procedure is carried out using MATLAB software and Modified Salp Swarm Algorithm (MSSA) that helps assess the Reliability indices of the proposed integrated IEEE RTS79 system for seven different configurations.

    More >

  • Open Access

    ARTICLE

    Minimizing Total Tardiness in a Two-Machine Flowshop Scheduling Problem with Availability Constraints

    Mohamed Ali Rakrouki1,2,*, Abeer Aljohani1, Nawaf Alharbe1, Abdelaziz Berrais2, Talel Ladhari2

    Intelligent Automation & Soft Computing, Vol.35, No.1, pp. 1119-1134, 2023, DOI:10.32604/iasc.2023.028604

    Abstract In this paper, we consider the problem of minimizing the total tardiness in a deterministic two-machine permutation flowshop scheduling problem subject to release dates of jobs and known unavailability periods of machines. The theoretical and practical importance of minimizing tardiness in flowshop scheduling environment has motivated us to investigate and solve this interested two-machine scheduling problem. Methods that solve this important optimality criterion in flowshop environment are mainly heuristics. In fact, despite the -hardness in the strong sense of the studied problem, to the best of our knowledge there are no approximate algorithms (constructive heuristics… More >

Displaying 1-10 on page 1 of 24. Per Page