Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (32)
  • Open Access

    ARTICLE

    Service Function Chain Deployment Algorithm Based on Multi-Agent Deep Reinforcement Learning

    Wanwei Huang1,*, Qiancheng Zhang1, Tao Liu2, Yaoli Xu1, Dalei Zhang3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4875-4893, 2024, DOI:10.32604/cmc.2024.055622 - 12 September 2024

    Abstract Aiming at the rapid growth of network services, which leads to the problems of long service request processing time and high deployment cost in the deployment of network function virtualization service function chain (SFC) under 5G networks, this paper proposes a multi-agent deep deterministic policy gradient optimization algorithm for SFC deployment (MADDPG-SD). Initially, an optimization model is devised to enhance the request acceptance rate, minimizing the latency and deploying the cost SFC is constructed for the network resource-constrained case. Subsequently, we model the dynamic problem as a Markov decision process (MDP), facilitating adaptation to the… More >

  • Open Access

    ARTICLE

    Improving Network Availability through Optimized Multipath Routing and Incremental Deployment Strategies

    Wei Zhang1, Haijun Geng2,*

    CMC-Computers, Materials & Continua, Vol.80, No.1, pp. 427-448, 2024, DOI:10.32604/cmc.2024.051871 - 18 July 2024

    Abstract Currently, distributed routing protocols are constrained by offering a single path between any pair of nodes, thereby limiting the potential throughput and overall network performance. This approach not only restricts the flow of data but also makes the network susceptible to failures in case the primary path is disrupted. In contrast, routing protocols that leverage multiple paths within the network offer a more resilient and efficient solution. Multipath routing, as a fundamental concept, surpasses the limitations of traditional shortest path first protocols. It not only redirects traffic to unused resources, effectively mitigating network congestion, but… More >

  • Open Access

    ARTICLE

    Systematic Cloud-Based Optimization: Twin-Fold Moth Flame Algorithm for VM Deployment and Load-Balancing

    Umer Nauman1, Yuhong Zhang2, Zhihui Li3, Tong Zhen1,3,*

    Intelligent Automation & Soft Computing, Vol.39, No.3, pp. 477-510, 2024, DOI:10.32604/iasc.2024.050726 - 11 July 2024

    Abstract Cloud computing has gained significant recognition due to its ability to provide a broad range of online services and applications. Nevertheless, existing commercial cloud computing models demonstrate an appropriate design by concentrating computational assets, such as preservation and server infrastructure, in a limited number of large-scale worldwide data facilities. Optimizing the deployment of virtual machines (VMs) is crucial in this scenario to ensure system dependability, performance, and minimal latency. A significant barrier in the present scenario is the load distribution, particularly when striving for improved energy consumption in a hypothetical grid computing framework. This design… More >

  • Open Access

    ARTICLE

    Reinforcement Learning Based Quantization Strategy Optimal Assignment Algorithm for Mixed Precision

    Yuejiao Wang, Zhong Ma*, Chaojie Yang, Yu Yang, Lu Wei

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 819-836, 2024, DOI:10.32604/cmc.2024.047108 - 25 April 2024

    Abstract The quantization algorithm compresses the original network by reducing the numerical bit width of the model, which improves the computation speed. Because different layers have different redundancy and sensitivity to data bit width. Reducing the data bit width will result in a loss of accuracy. Therefore, it is difficult to determine the optimal bit width for different parts of the network with guaranteed accuracy. Mixed precision quantization can effectively reduce the amount of computation while keeping the model accuracy basically unchanged. In this paper, a hardware-aware mixed precision quantization strategy optimal assignment algorithm adapted to… More >

  • Open Access

    ARTICLE

    An Optimization Approach of IoD Deployment for Optimal Coverage Based on Radio Frequency Model

    Tarek Sheltami1,*, Gamil Ahmed1, Ansar Yasar2

    CMES-Computer Modeling in Engineering & Sciences, Vol.139, No.3, pp. 2627-2647, 2024, DOI:10.32604/cmes.2023.044973 - 11 March 2024

    Abstract Recently, Internet of Drones (IoD) has garnered significant attention due to its widespread applications. However, deploying IoD for area coverage poses numerous limitations and challenges. These include interference between neighboring drones, the need for directional antennas, and altitude restrictions for drones. These challenges necessitate the development of efficient solutions. This research paper presents a cooperative decision-making approach for an efficient IoD deployment to address these challenges effectively. The primary objective of this study is to achieve an efficient IoD deployment strategy that maximizes the coverage region while minimizing interference between neighboring drones. In deployment problem,… More >

  • Open Access

    ARTICLE

    Deployment Strategy for Multiple Controllers Based on the Aviation On-Board Software-Defined Data Link Network

    Yuting Zhu1, Yanfang Fu2,*, Yang Ce3, Pan Deng1, Jianpeng Zhu1, Huankun Su1

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3867-3894, 2023, DOI:10.32604/cmc.2023.046772 - 26 December 2023

    Abstract In light of the escalating demand and intricacy of services in contemporary terrestrial, maritime, and aerial combat operations, there is a compelling need for enhanced service quality and efficiency in airborne cluster communication networks. Software-Defined Networking (SDN) proffers a viable solution for the multifaceted task of cooperative communication transmission and management across different operational domains within complex combat contexts, due to its intrinsic ability to flexibly allocate and centrally administer network resources. This study pivots around the optimization of SDN controller deployment within airborne data link clusters. A collaborative multi-controller architecture predicated on airborne data… More >

  • Open Access

    ARTICLE

    Joint On-Demand Pruning and Online Distillation in Automatic Speech Recognition Language Model Optimization

    Soonshin Seo1,2, Ji-Hwan Kim2,*

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 2833-2856, 2023, DOI:10.32604/cmc.2023.042816 - 26 December 2023

    Abstract Automatic speech recognition (ASR) systems have emerged as indispensable tools across a wide spectrum of applications, ranging from transcription services to voice-activated assistants. To enhance the performance of these systems, it is important to deploy efficient models capable of adapting to diverse deployment conditions. In recent years, on-demand pruning methods have obtained significant attention within the ASR domain due to their adaptability in various deployment scenarios. However, these methods often confront substantial trade-offs, particularly in terms of unstable accuracy when reducing the model size. To address challenges, this study introduces two crucial empirical findings. Firstly,… More >

  • Open Access

    ARTICLE

    Research on Human Activity Recognition Algorithm Based on LSTM-1DCNN

    Yuesheng Zhao1, Xiaoling Wang1,*, Yutong Luo2,*, Muhammad Shamrooz Aslam3

    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3325-3347, 2023, DOI:10.32604/cmc.2023.040528 - 26 December 2023

    Abstract With the rapid advancement of wearable devices, Human Activities Recognition (HAR) based on these devices has emerged as a prominent research field. The objective of this study is to enhance the recognition performance of HAR by proposing an LSTM-1DCNN recognition algorithm that utilizes a single triaxial accelerometer. This algorithm comprises two branches: one branch consists of a Long and Short-Term Memory Network (LSTM), while the other parallel branch incorporates a one-dimensional Convolutional Neural Network (1DCNN). The parallel architecture of LSTM-1DCNN initially extracts spatial and temporal features from the accelerometer data separately, which are then concatenated… More >

  • Open Access

    ARTICLE

    Hybrid Power Bank Deployment Model for Energy Supply Coverage Optimization in Industrial Wireless Sensor Network

    Hang Yang1,2,*, Xunbo Li1, Witold Pedrycz2

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1531-1551, 2023, DOI:10.32604/iasc.2023.039256 - 21 June 2023

    Abstract Energy supply is one of the most critical challenges of wireless sensor networks (WSNs) and industrial wireless sensor networks (IWSNs). While research on coverage optimization problem (COP) centers on the network’s monitoring coverage, this research focuses on the power banks’ energy supply coverage. The study of 2-D and 3-D spaces is typical in IWSN, with the realistic environment being more complex with obstacles (i.e., machines). A 3-D surface is the field of interest (FOI) in this work with the established hybrid power bank deployment model for the energy supply COP optimization of IWSN. The hybrid… More >

  • Open Access

    ARTICLE

    Overbooking-Enabled Task Scheduling and Resource Allocation in Mobile Edge Computing Environments

    Jixun Gao1,2, Bingyi Hu2, Jialei Liu3,4,*, Huaichen Wang5, Quanzhen Huang1, Yuanyuan Zhao6

    Intelligent Automation & Soft Computing, Vol.37, No.1, pp. 1-16, 2023, DOI:10.32604/iasc.2023.036890 - 29 April 2023

    Abstract Mobile Edge Computing (MEC) is proposed to solve the needs of Internet of Things (IoT) users for high resource utilization, high reliability and low latency of service requests. However, the backup virtual machine is idle when its primary virtual machine is running normally, which will waste resources. Overbooking the backup virtual machine under the above circumstances can effectively improve resource utilization. First, these virtual machines are deployed into slots randomly, and then some tasks with cooperative relationship are offloaded to virtual machines for processing. Different deployment locations have different resource utilization and average service response… More >

Displaying 1-10 on page 1 of 32. Per Page