Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    Optimal Scheduling of Multiple Rail Cranes in Rail Stations with Interference Crane Areas

    Nguyen Vu Anh Duy, Nguyen Le Thai, Nguyen Huu Tho*

    Intelligent Automation & Soft Computing, Vol.39, No.1, pp. 15-31, 2024, DOI:10.32604/iasc.2024.038272 - 29 March 2024

    Abstract In this paper, we consider a multi-crane scheduling problem in rail stations because their operations directly influence the throughput of the rail stations. In particular, the job is not only assigned to cranes but also the job sequencing is implemented for each crane to minimize the makespan of cranes. A dual cycle of cranes is used to minimize the number of working cycles of cranes. The rail crane scheduling problems in this study are based on the movement of containers. We consider not only the gantry moves, but also the trolley moves as well as More >

  • Open Access

    ARTICLE

    Performance Evaluation of Virtualization Methodologies to Facilitate NFV Deployment

    Sumbal Zahoor1, Ishtiaq Ahmad1, Ateeq Ur Rehman2, Elsayed Tag Eldin3, Nivin A. Ghamry4, Muhammad Shafiq5,*

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 311-329, 2023, DOI:10.32604/cmc.2023.035960 - 06 February 2023

    Abstract The development of the Next-Generation Wireless Network (NGWN) is becoming a reality. To conduct specialized processes more, rapid network deployment has become essential. Methodologies like Network Function Virtualization (NFV), Software-Defined Networks (SDN), and cloud computing will be crucial in addressing various challenges that 5G networks will face, particularly adaptability, scalability, and reliability. The motivation behind this work is to confirm the function of virtualization and the capabilities offered by various virtualization platforms, including hypervisors, clouds, and containers, which will serve as a guide to dealing with the stimulating environment of 5G. This is particularly crucial More >

  • Open Access

    ARTICLE

    Cyber Secure Framework for Smart Containers Based on Novel Hybrid DTLS Protocol

    Waseem Ullah Khan*, Safdar Nawaz Khan Marwat, Salman Ahmed

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 1297-1313, 2022, DOI:10.32604/csse.2022.024018 - 09 May 2022

    Abstract The Internet of Things (IoTs) is apace growing, billions of IoT devices are connected to the Internet which communicate and exchange data among each other. Applications of IoT can be found in many fields of engineering and sciences such as healthcare, traffic, agriculture, oil and gas industries, and logistics. In logistics, the products which are to be transported may be sensitive and perishable, and require controlled environment. Most of the commercially available logistic containers are not integrated with IoT devices to provide controlled environment parameters inside the container and to transmit data to a remote… More >

  • Open Access

    ARTICLE

    Container Introspection: Using External Management Containers to Monitor Containers in Cloud Computing

    Dongyang Zhan1,*, Kai Tan1, Lin Ye1,2, Haining Yu1,3, Hao Liu4

    CMC-Computers, Materials & Continua, Vol.69, No.3, pp. 3783-3794, 2021, DOI:10.32604/cmc.2021.019432 - 24 August 2021

    Abstract Cloud computing plays an important role in today's Internet environment, which meets the requirements of scalability, security and reliability by using virtualization technologies. Container technology is one of the two mainstream virtualization solutions. Its lightweight, high deployment efficiency make container technology widely used in large-scale cloud computing. While container technology has created huge benefits for cloud service providers and tenants, it cannot meet the requirements of security monitoring and management from a tenant perspective. Currently, tenants can only run their security monitors in the target container, but it is not secure because the attacker is… More >

  • Open Access

    ARTICLE

    Computer Simulation of Random Sphere Packing in an Arbitrarily Shaped Container

    S.X. Li1, L. Zhao1, Y.W. Liu2

    CMC-Computers, Materials & Continua, Vol.7, No.2, pp. 109-118, 2008, DOI:10.3970/cmc.2008.007.109

    Abstract Most simulations of random sphere packing concern a cubic or cylindric container with periodic boundary, containers of other shapes are rarely studied. In this paper, a new relaxation algorithm with pre-expanding procedure for random sphere packing in an arbitrarily shaped container is presented. Boundaries of the container are simulated by overlapping spheres which covers the boundary surface of the container. We find 0.4~0.6 of the overlap rate is a proper value for boundary spheres. The algorithm begins with a random distribution of small internal spheres. Then the expansion and relaxation procedures are performed alternately to… More >

  • Open Access

    ARTICLE

    On the Nature and Structure of Possible Three-dimensional Steady Flows in Closed and Open Parallelepipedic and Cubical Containers under Different Heating Conditions and Driving Forces.

    Marcello Lappa1, 2

    FDMP-Fluid Dynamics & Materials Processing, Vol.1, No.1, pp. 1-20, 2005, DOI:10.3970/fdmp.2005.001.001

    Abstract Possible natural transport mechanisms in cubical and shallow cavities with different heating conditions (from below or from the side) are investigated by means of numerical solution of the non-linear model equations and multiprocessor computations. Attention is focused on a variety of three-dimensional steady effects that can arise in such configurations in the case of low-Pr liquids (silicon melt) even for relatively small values of the temperature gradient due to localized boundary effects and/or true instabilities of the flow. Such aspects are still poorly known or completely ignored owing to the fact that most of the More >

Displaying 1-10 on page 1 of 6. Per Page