Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (15)
  • Open Access

    ARTICLE

    AMAD: Adaptive Mapping Approach for Datacenter Networks, an Energy-Friend Resource Allocation Framework via Repeated Leader Follower Game

    Ahmad Nahar Quttoum1,*, Muteb Alshammari2

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4577-4601, 2024, DOI:10.32604/cmc.2024.054102 - 12 September 2024

    Abstract Cloud Datacenter Network (CDN) providers usually have the option to scale their network structures to allow for far more resource capacities, though such scaling options may come with exponential costs that contradict their utility objectives. Yet, besides the cost of the physical assets and network resources, such scaling may also impose more loads on the electricity power grids to feed the added nodes with the required energy to run and cool, which comes with extra costs too. Thus, those CDN providers who utilize their resources better can certainly afford their services at lower price-units when… More >

  • Open Access

    ARTICLE

    Could Military Commanders’ Good Leadership Influence Subordinates’ Smartphone Overdependence? A Serial Mediation Analysis

    Seungju Hyun1, Xyle Ku1,2, Sungrok Kang1, Yoonyoung Choi1, Jaewon Ko1, Hyunyup Lee1,*

    International Journal of Mental Health Promotion, Vol.25, No.11, pp. 1187-1195, 2023, DOI:10.32604/ijmhp.2023.030745 - 08 December 2023

    Abstract Owing to the ubiquitous use of smartphones by soldiers, military researchers have an increasing interest in potentially problematic side effects such as smartphone overdependence. This raises a question regarding the psychological mechanisms underlying the potentially self-damaging use of smartphones. Here, we address this question by analyzing how heterogeneity in commander’s good leadership explains subordinate soldiers’ differences in self-control and smartphone use. Specifically, we found that subordinate soldiers who thought their commander's leadership was good were self-regulated, less dependent on smartphones, less stressed, and finally had good mental health. This result indicates that commander’s good leadership More >

  • Open Access

    ARTICLE

    Applied Linguistics with Mixed Leader Optimizer Based English Text Summarization Model

    Hala J. Alshahrani1, Khaled Tarmissi2, Ayman Yafoz3, Abdullah Mohamed4, Manar Ahmed Hamza5,*, Ishfaq Yaseen5, Abu Sarwar Zamani5, Mohammad Mahzari6

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3203-3219, 2023, DOI:10.32604/iasc.2023.034848 - 15 March 2023

    Abstract The term ‘executed linguistics’ corresponds to an interdisciplinary domain in which the solutions are identified and provided for real-time language-related problems. The exponential generation of text data on the Internet must be leveraged to gain knowledgeable insights. The extraction of meaningful insights from text data is crucial since it can provide value-added solutions for business organizations and end-users. The Automatic Text Summarization (ATS) process reduces the primary size of the text without losing any basic components of the data. The current study introduces an Applied Linguistics-based English Text Summarization using a Mixed Leader-Based Optimizer with… More >

  • Open Access

    ARTICLE

    Improved Multileader Optimization with Shadow Encryption for Medical Images in IoT Environment

    Mesfer Al Duhayyim1,*, Mohammed Maray2, Ayman Qahmash2, Fatma S. Alrayes3, Nuha Alshuqayran4, Jaber S. Alzahrani5, Mohammed Alghamdi2,6, Abdullah Mohamed7

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3133-3149, 2023, DOI:10.32604/cmc.2023.032740 - 31 October 2022

    Abstract Nowadays, security plays an important role in Internet of Things (IoT) environment especially in medical services’ domains like disease prediction and medical data storage. In healthcare sector, huge volumes of data are generated on a daily basis, owing to the involvement of advanced health care devices. In general terms, health care images are highly sensitive to alterations due to which any modifications in its content can result in faulty diagnosis. At the same time, it is also significant to maintain the delicate contents of health care images during reconstruction stage. Therefore, an encryption system is… More >

  • Open Access

    ARTICLE

    Assessing Conscientiousness and Identify Leadership Quality Using Temporal Sequence Images

    T. S. Kanchana*, B. Smitha Evelin Zoraida

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2003-2013, 2023, DOI:10.32604/iasc.2023.029412 - 19 July 2022

    Abstract Human Facial expressions exhibits the inner personality. Evaluating the inner personality is performed through questionnaires during recruitment process. However, the evaluation through questionnaires performs less due to anxiety, and stress during interview and prediction of leadership quality becomes a challenging problem. To the above problem, Temporal sequence based SENet architecture (TSSA) is proposed for accurate evaluation of personality trait for employing the correct person for leadership position. Moreover, SENet is integration with modern architectures for performance evaluation. In Proposed TSSA, face book facial images of a particular person for a period of one month and… More >

  • Open Access

    ARTICLE

    Mutated Leader Sine-Cosine Algorithm for Secure Smart IoT-Blockchain of Industry 4.0

    Mustufa Haider Abidi*, Hisham Alkhalefah, Muneer Khan Mohammed

    CMC-Computers, Materials & Continua, Vol.73, No.3, pp. 5367-5383, 2022, DOI:10.32604/cmc.2022.030018 - 28 July 2022

    Abstract In modern scenarios, Industry 4.0 entails invention with various advanced technology, and blockchain is one among them. Blockchains are incorporated to enhance privacy, data transparency as well as security for both large and small scale enterprises. Industry 4.0 is considered as a new synthesis fabrication technique that permits the manufacturers to attain their target effectively. However, because numerous devices and machines are involved, data security and privacy are always concerns. To achieve intelligence in Industry 4.0, blockchain technologies can overcome potential cybersecurity constraints. Nowadays, the blockchain and internet of things (IoT) are gaining more attention… More >

  • Open Access

    ARTICLE

    The Impact of Spiritual Leadership on Employee’s Work Engagement–A Study Based on the Mediating Effect of Goal Self-Concordance and Self-Efficacy

    Lei Chen1, Ting Wen2,*, Jigan Wang1, Hong Gao1

    International Journal of Mental Health Promotion, Vol.24, No.1, pp. 69-84, 2022, DOI:10.32604/ijmhp.2022.018932 - 20 December 2021

    Abstract The average stress of people in China’s workplace is reaching the peak in recent two years. To improve employee’s positive psychological factors, Spiritual leadership has a good performance in this regard. Based on the mediating effect of goal self-concordance and self-efficacy, this paper further studies the impact of spiritual leadership on employee’s work engagement. Through the empirical study, the following conclusions are drawn: (1) Spiritual leadership significantly positively affects the employee’s work engagement. (2) Spiritual leadership has a significant positive effect on goal self-concordance and self-efficacy. (3) Goal self-concordance and self-efficacy have significant positive effects More >

  • Open Access

    ARTICLE

    MLA: A New Mutated Leader Algorithm for Solving Optimization Problems

    Fatemeh Ahmadi Zeidabadi1, Sajjad Amiri Doumari1, Mohammad Dehghani2, Zeinab Montazeri3, Pavel Trojovský4,*, Gaurav Dhiman5

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5631-5649, 2022, DOI:10.32604/cmc.2022.021072 - 11 October 2021

    Abstract Optimization plays an effective role in various disciplines of science and engineering. Optimization problems should either be optimized using the appropriate method (i.e., minimization or maximization). Optimization algorithms are one of the efficient and effective methods in providing quasi-optimal solutions for these type of problems. In this study, a new algorithm called the Mutated Leader Algorithm (MLA) is presented. The main idea in the proposed MLA is to update the members of the algorithm population in the search space based on the guidance of a mutated leader. In addition to information about the best member… More >

  • Open Access

    ARTICLE

    Leader-Follower UAV Formation Model Based on R5DOS-Intersection Model

    Jian Li1,3, Weijian Zhang1, Yating Hu1,4, Xiaoguang Li2,*, Zhun Wang1

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2493-2511, 2021, DOI:10.32604/cmc.2021.018743 - 21 July 2021

    Abstract This paper proposes a formation of multiple unmanned aerial vehicles (UAVs) based on the R5DOS (RCC-5 and orientation direction) intersection model. After improving the R5DOS-intersection model, we evenly arranged 16 UAVs in 16 spatial regions. Compared with those of the rectangular formation model and the grid formation model, the communication costs, time costs, and energy costs of the R5DOS model formation were effectively reduced. At the same time, the operation time of UAV formation was significantly enhanced. The leader-follower method can enhance the robustness of the UAV formation and ensure the integrity of communication during… More >

  • Open Access

    ARTICLE

    A Genetic Based Leader Election Algorithm for IoT Cloud Data Processing

    Samira Kanwal1, Zeshan Iqbal1, Aun Irtaza1, Rashid Ali2, Kamran Siddique3,*

    CMC-Computers, Materials & Continua, Vol.68, No.2, pp. 2469-2486, 2021, DOI:10.32604/cmc.2021.014709 - 13 April 2021

    Abstract In IoT networks, nodes communicate with each other for computational services, data processing, and resource sharing. Most of the time huge data is generated at the network edge due to extensive communication between IoT devices. So, this tidal data is transferred to the cloud data center (CDC) for efficient processing and effective data storage. In CDC, leader nodes are responsible for higher performance, reliability, deadlock handling, reduced latency, and to provide cost-effective computational services to the users. However, the optimal leader selection is a computationally hard problem as several factors like memory, CPU MIPS, and… More >

Displaying 1-10 on page 1 of 15. Per Page