In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow tasks.In cloud data centers,fog computing takes more time to run workflow applications...In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow tasks.In cloud data centers,fog computing takes more time to run workflow applications.Therefore,it is essential to develop effective models for Virtual Machine(VM)allocation and task scheduling in fog computing environments.Effective task scheduling,VM migration,and allocation,altogether optimize the use of computational resources across different fog nodes.This process ensures that the tasks are executed with minimal energy consumption,which reduces the chances of resource bottlenecks.In this manuscript,the proposed framework comprises two phases:(i)effective task scheduling using a fractional selectivity approach and(ii)VM allocation by proposing an algorithm by the name of Fitness Sharing Chaotic Particle Swarm Optimization(FSCPSO).The proposed FSCPSO algorithm integrates the concepts of chaos theory and fitness sharing that effectively balance both global exploration and local exploitation.This balance enables the use of a wide range of solutions that leads to minimal total cost and makespan,in comparison to other traditional optimization algorithms.The FSCPSO algorithm’s performance is analyzed using six evaluation measures namely,Load Balancing Level(LBL),Average Resource Utilization(ARU),total cost,makespan,energy consumption,and response time.In relation to the conventional optimization algorithms,the FSCPSO algorithm achieves a higher LBL of 39.12%,ARU of 58.15%,a minimal total cost of 1175,and a makespan of 85.87 ms,particularly when evaluated for 50 tasks.展开更多
A combination of the computational symbolic calculation, mathematical approach and physico-mechanical model lends to a computational intellectual analytical approach developed by the author. There is a principal diffe...A combination of the computational symbolic calculation, mathematical approach and physico-mechanical model lends to a computational intellectual analytical approach developed by the author. There is a principal difference between the computer proof and the computer derivation completed by the computer, also difference between the numerical and symbolic calculations. In this investigation the computational analytical approach is extended, and an unsteady flow of non-Newtonian fluid in the gap between two rotating coaxial cylinders is studied. The Oldroyd fluid B model is used by which the Weissenberg effects are explained in a good comparison with the experiments. The governing equations are reduced to a partial differential equation of 3 rd order for the dimensionless velocity. Using the computer software Macsyma and an improved variational approach the problem with the initial and boundary conditions is then reduced to a problem of an ordinary differential equation for different approximations. The analytical solutions are given for the 1 st, 2 nd and 3 rd approximations. The present investigation shows the ability of the computational symbolic manipulation in solving the problems of non-Newtonian fluid flows. There is a possibility of that to solve the problems in mathematics and mechanics. An important conclusion can be drawn from the results that the transition from a steady state to another steady state is non-unique.展开更多
Nowadays,succeeding safe communication and protection-sensitive data from unauthorized access above public networks are the main worries in cloud servers.Hence,to secure both data and keys ensuring secured data storag...Nowadays,succeeding safe communication and protection-sensitive data from unauthorized access above public networks are the main worries in cloud servers.Hence,to secure both data and keys ensuring secured data storage and access,our proposed work designs a Novel Quantum Key Distribution(QKD)relying upon a non-commutative encryption framework.It makes use of a Novel Quantum Key Distribution approach,which guarantees high level secured data transmission.Along with this,a shared secret is generated using Diffie Hellman(DH)to certify secured key generation at reduced time complexity.Moreover,a non-commutative approach is used,which effectively allows the users to store and access the encrypted data into the cloud server.Also,to prevent data loss or corruption caused by the insiders in the cloud,Optimized Genetic Algorithm(OGA)is utilized,which effectively recovers the data and retrieve it if the missed data without loss.It is then followed with the decryption process as if requested by the user.Thus our proposed framework ensures authentication and paves way for secure data access,with enhanced performance and reduced complexities experienced with the prior works.展开更多
Dominance-based rough set approach(DRSA) permits representation and analysis of all phenomena involving monotonicity relationship between some measures or perceptions.DRSA has also some merits within granular computin...Dominance-based rough set approach(DRSA) permits representation and analysis of all phenomena involving monotonicity relationship between some measures or perceptions.DRSA has also some merits within granular computing,as it extends the paradigm of granular computing to ordered data,specifies a syntax and modality of information granules which are appropriate for dealing with ordered data,and enables computing with words and reasoning about ordered data.Granular computing with ordered data is a very general paradigm,because other modalities of information constraints,such as veristic,possibilistic and probabilistic modalities,have also to deal with ordered value sets(with qualifiers relative to grades of truth,possibility and probability),which gives DRSA a large area of applications.展开更多
In this study computational fluid dynamics (CFD) approach was used to study mixing in an Industrial gold leaching tank. The objective was to analyze the extent of mixing in the tank by producing visual images of the v...In this study computational fluid dynamics (CFD) approach was used to study mixing in an Industrial gold leaching tank. The objective was to analyze the extent of mixing in the tank by producing visual images of the various mixing zones in the tank domain. Eddy viscosity plots that characterise the extent of mixing in the tank were generated in the flow field obtained by an Eulerian-Eulerian approach. The extent of mixing was found to be greatest in the circulation loops of the impeller discharge region and least at the top and bottom portions of the tank. Trailing vortices that contribute to some level of mixing were identified in between the impeller blades. This approach could be used to enhance optimum design of mixing vessels and to eliminate the need for pilot plants.展开更多
This paper employs mathematical modeling and algebraic approach to derive the optimal manufacturing batch size and number of shipment for a vendor-buyer integrated economic production quantity (EPQ) model with scrap. ...This paper employs mathematical modeling and algebraic approach to derive the optimal manufacturing batch size and number of shipment for a vendor-buyer integrated economic production quantity (EPQ) model with scrap. Unlike the conventional method by using differential calculus to determine replenishment lot size and optimal number of shipments for such an integrated system, this paper proposes a straightforward algebraic approach to replace the use of calculus on the total cost function for solving the optimal production- shipment policies. A simpler form for computing long-run average cost for such a vendor- buyer integrated EPQ problem is also provided.展开更多
For the complex and large targets like naval vessels,the computation for their RCS usu- ally uses high-frequency approach.Presenting the geometry modeling and the computation principle on naval vessel's RCS,this p...For the complex and large targets like naval vessels,the computation for their RCS usu- ally uses high-frequency approach.Presenting the geometry modeling and the computation principle on naval vessel's RCS,this paper puts the emphasis on the key techniques of computing the naval vessel's RCS based on high-frequency approach with the analysis on mast's effect to the total RCS as the example.展开更多
Warning alerts are specially designed to protect user rights and safety to avoid serious damage caused by overlooking the essence of warning alerts. Today’s world of Information Communication Technology (ICT) needs i...Warning alerts are specially designed to protect user rights and safety to avoid serious damage caused by overlooking the essence of warning alerts. Today’s world of Information Communication Technology (ICT) needs improvement and to review the decisions of security experts in terms of improving warning designs and dialogues, and timely inform the authorities to take quick action at the right time and choice. Human behaviour is deeply involved in most of the security failures and its poor response. If we are able to check and monitor human behaviour in any organisation, we can achieve quality assurance and provide best services to our customers. We have arranged a study in the Center of Post Graduate Studies, International Islamic University, Malaysia (CPS-IIUM), department of Hajj Services-Makkah, and Hospital Management System-Makkah comprised of Observation, Interviews, Questionnaire and discussion based on organizational structure and job activities of people involved in different scenarios and positions under one umbrella of organizational objectives in order to trap the human error in order to take rapid action and response from the management team. Human behaviour is deeply observed and checked while performing different job activities in order to identify the serious errors at the right time during job performance at various levels. We have applied the concept of Brahm’s Language for the simulation of human behaviour which proves an opportunity to simulate human behaviour while performing job activities. Customer service can be improved easily if necessary measures and decisions are taken at the right time and place in any organisation.展开更多
To address traffic congestion,this study improves Mobile Netv2-you only look once version 4(YOLOv4)target detection algorithm(Mobile Netv2-YOLOv4-K++F)and introduces an embedded traffic information processing solution...To address traffic congestion,this study improves Mobile Netv2-you only look once version 4(YOLOv4)target detection algorithm(Mobile Netv2-YOLOv4-K++F)and introduces an embedded traffic information processing solution based on edge computing.We transition models initially designed for large-scale graphics processing units(GPUs)to edge computing devices,maximizing the strengths of both deep learning and edge computing technologies.This approach integrates embedded devices with the current traffic system,eliminating the need for extensive equipment updates.The solution enables real-time traffic flow monitoring and license plate recognition at the edge,synchronizing instantaneously with the cloud,allowing for intelligent adjustments of traffic signals and accident forewarnings,enhancing road utilization,and facilitating traffic flow optimization.Through on-site testing using the RK3399PRO development board and the Mobile Netv2-YOLOv4-K++F object detection algorithm,the upgrade costs of this approach are less than one-tenth of conventional methods.Under favorable weather conditions,the traffic flow detection accuracy reaches as high as 98%,with license plate recognition exceeding 80%.展开更多
Herein,a thermodynamic model aimed at describing deoxidation equilibria in liquid steel was developed.The model provides explicit forms of the activity coefficient of solutes in liquid steel,eliminating the need for t...Herein,a thermodynamic model aimed at describing deoxidation equilibria in liquid steel was developed.The model provides explicit forms of the activity coefficient of solutes in liquid steel,eliminating the need for the minimization of internal Gibbs energy preliminarily when solving deoxidation equilibria.The elimination of internal Gibbs energy minimization is particularly advantageous during the coupling of deoxidation equilibrium calculations with computationally intensive approaches,such as computational fluid dynamics.The model enables efficient calculations through direct embedment of the explicit forms of activity coefficient in the computing code.The proposed thermodynamic model was developed using a quasichemical approach with two key approximations:random mixing of metallic elements(Fe and oxidizing metal) and strong nonrandom pairing of metal and oxygen as nearest neighbors.Through these approximations,the quasichemical approach yielded the activity coefficients of solutes as explicit functions of composition and temperature without requiring the minimization of internal Gibbs energy or the coupling of separate programs.The model was successfully applied in the calculation of deoxidation equilibria of various elements(Al,B,C,Ca,Ce,Cr,La,Mg,Mn,Nb,Si,Ti,V,and Zr).The limitations of the model arising from these assumptions were also discussed.展开更多
Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information....Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information. One is to generate sparse attention coefficients associated with acoustic and visual modalities, which helps locate critical emotional se-mantics. The other is fusing complementary cross‐modal representation to construct optimal salient feature combinations of multiple modalities. A Conditional Transformer Fusion Network is proposed to handle these problems. Firstly, the authors equip the transformer module with CNN layers to enhance the detection of subtle signal patterns in nonverbal sequences. Secondly, sentiment words are utilised as context conditions to guide the computation of cross‐modal attention. As a result, the located nonverbal fea-tures are not only salient but also complementary to sentiment words directly. Experi-mental results show that the authors’ method achieves state‐of‐the‐art performance on several multimodal affective analysis datasets.展开更多
The development of spatial transcriptomics(ST)technologies has transformed genetic research from a single-cell data level to a two-dimensional spatial coordinate system and facilitated the study of the composition and...The development of spatial transcriptomics(ST)technologies has transformed genetic research from a single-cell data level to a two-dimensional spatial coordinate system and facilitated the study of the composition and function of various cell subsets in different environments and organs.The large-scale data generated by these ST technologies,which contain spatial gene expression information,have elicited the need for spatially resolved approaches to meet the requirements of computational and biological data interpretation.These requirements include dealing with the explosive growth of data to determine the cell-level and gene-level expression,correcting the inner batch effect and loss of expression to improve the data quality,conducting efficient interpretation and in-depth knowledge mining both at the single-cell and tissue-wide levels,and conducting multi-omics integration analysis to provide an extensible framework toward the in-depth understanding of biological processes.However,algorithms designed specifically for ST technologies to meet these requirements are still in their infancy.Here,we review computational approaches to these problems in light of corresponding issues and challenges,and present forward-looking insights into algorithm development.展开更多
基金This work was supported in part by the National Science and Technology Council of Taiwan,under Contract NSTC 112-2410-H-324-001-MY2.
文摘In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow tasks.In cloud data centers,fog computing takes more time to run workflow applications.Therefore,it is essential to develop effective models for Virtual Machine(VM)allocation and task scheduling in fog computing environments.Effective task scheduling,VM migration,and allocation,altogether optimize the use of computational resources across different fog nodes.This process ensures that the tasks are executed with minimal energy consumption,which reduces the chances of resource bottlenecks.In this manuscript,the proposed framework comprises two phases:(i)effective task scheduling using a fractional selectivity approach and(ii)VM allocation by proposing an algorithm by the name of Fitness Sharing Chaotic Particle Swarm Optimization(FSCPSO).The proposed FSCPSO algorithm integrates the concepts of chaos theory and fitness sharing that effectively balance both global exploration and local exploitation.This balance enables the use of a wide range of solutions that leads to minimal total cost and makespan,in comparison to other traditional optimization algorithms.The FSCPSO algorithm’s performance is analyzed using six evaluation measures namely,Load Balancing Level(LBL),Average Resource Utilization(ARU),total cost,makespan,energy consumption,and response time.In relation to the conventional optimization algorithms,the FSCPSO algorithm achieves a higher LBL of 39.12%,ARU of 58.15%,a minimal total cost of 1175,and a makespan of 85.87 ms,particularly when evaluated for 50 tasks.
文摘A combination of the computational symbolic calculation, mathematical approach and physico-mechanical model lends to a computational intellectual analytical approach developed by the author. There is a principal difference between the computer proof and the computer derivation completed by the computer, also difference between the numerical and symbolic calculations. In this investigation the computational analytical approach is extended, and an unsteady flow of non-Newtonian fluid in the gap between two rotating coaxial cylinders is studied. The Oldroyd fluid B model is used by which the Weissenberg effects are explained in a good comparison with the experiments. The governing equations are reduced to a partial differential equation of 3 rd order for the dimensionless velocity. Using the computer software Macsyma and an improved variational approach the problem with the initial and boundary conditions is then reduced to a problem of an ordinary differential equation for different approximations. The analytical solutions are given for the 1 st, 2 nd and 3 rd approximations. The present investigation shows the ability of the computational symbolic manipulation in solving the problems of non-Newtonian fluid flows. There is a possibility of that to solve the problems in mathematics and mechanics. An important conclusion can be drawn from the results that the transition from a steady state to another steady state is non-unique.
文摘Nowadays,succeeding safe communication and protection-sensitive data from unauthorized access above public networks are the main worries in cloud servers.Hence,to secure both data and keys ensuring secured data storage and access,our proposed work designs a Novel Quantum Key Distribution(QKD)relying upon a non-commutative encryption framework.It makes use of a Novel Quantum Key Distribution approach,which guarantees high level secured data transmission.Along with this,a shared secret is generated using Diffie Hellman(DH)to certify secured key generation at reduced time complexity.Moreover,a non-commutative approach is used,which effectively allows the users to store and access the encrypted data into the cloud server.Also,to prevent data loss or corruption caused by the insiders in the cloud,Optimized Genetic Algorithm(OGA)is utilized,which effectively recovers the data and retrieve it if the missed data without loss.It is then followed with the decryption process as if requested by the user.Thus our proposed framework ensures authentication and paves way for secure data access,with enhanced performance and reduced complexities experienced with the prior works.
文摘Dominance-based rough set approach(DRSA) permits representation and analysis of all phenomena involving monotonicity relationship between some measures or perceptions.DRSA has also some merits within granular computing,as it extends the paradigm of granular computing to ordered data,specifies a syntax and modality of information granules which are appropriate for dealing with ordered data,and enables computing with words and reasoning about ordered data.Granular computing with ordered data is a very general paradigm,because other modalities of information constraints,such as veristic,possibilistic and probabilistic modalities,have also to deal with ordered value sets(with qualifiers relative to grades of truth,possibility and probability),which gives DRSA a large area of applications.
文摘In this study computational fluid dynamics (CFD) approach was used to study mixing in an Industrial gold leaching tank. The objective was to analyze the extent of mixing in the tank by producing visual images of the various mixing zones in the tank domain. Eddy viscosity plots that characterise the extent of mixing in the tank were generated in the flow field obtained by an Eulerian-Eulerian approach. The extent of mixing was found to be greatest in the circulation loops of the impeller discharge region and least at the top and bottom portions of the tank. Trailing vortices that contribute to some level of mixing were identified in between the impeller blades. This approach could be used to enhance optimum design of mixing vessels and to eliminate the need for pilot plants.
文摘This paper employs mathematical modeling and algebraic approach to derive the optimal manufacturing batch size and number of shipment for a vendor-buyer integrated economic production quantity (EPQ) model with scrap. Unlike the conventional method by using differential calculus to determine replenishment lot size and optimal number of shipments for such an integrated system, this paper proposes a straightforward algebraic approach to replace the use of calculus on the total cost function for solving the optimal production- shipment policies. A simpler form for computing long-run average cost for such a vendor- buyer integrated EPQ problem is also provided.
文摘For the complex and large targets like naval vessels,the computation for their RCS usu- ally uses high-frequency approach.Presenting the geometry modeling and the computation principle on naval vessel's RCS,this paper puts the emphasis on the key techniques of computing the naval vessel's RCS based on high-frequency approach with the analysis on mast's effect to the total RCS as the example.
文摘Warning alerts are specially designed to protect user rights and safety to avoid serious damage caused by overlooking the essence of warning alerts. Today’s world of Information Communication Technology (ICT) needs improvement and to review the decisions of security experts in terms of improving warning designs and dialogues, and timely inform the authorities to take quick action at the right time and choice. Human behaviour is deeply involved in most of the security failures and its poor response. If we are able to check and monitor human behaviour in any organisation, we can achieve quality assurance and provide best services to our customers. We have arranged a study in the Center of Post Graduate Studies, International Islamic University, Malaysia (CPS-IIUM), department of Hajj Services-Makkah, and Hospital Management System-Makkah comprised of Observation, Interviews, Questionnaire and discussion based on organizational structure and job activities of people involved in different scenarios and positions under one umbrella of organizational objectives in order to trap the human error in order to take rapid action and response from the management team. Human behaviour is deeply observed and checked while performing different job activities in order to identify the serious errors at the right time during job performance at various levels. We have applied the concept of Brahm’s Language for the simulation of human behaviour which proves an opportunity to simulate human behaviour while performing job activities. Customer service can be improved easily if necessary measures and decisions are taken at the right time and place in any organisation.
基金supported by the National Natural Science Foundation of China(No.62066041)。
文摘To address traffic congestion,this study improves Mobile Netv2-you only look once version 4(YOLOv4)target detection algorithm(Mobile Netv2-YOLOv4-K++F)and introduces an embedded traffic information processing solution based on edge computing.We transition models initially designed for large-scale graphics processing units(GPUs)to edge computing devices,maximizing the strengths of both deep learning and edge computing technologies.This approach integrates embedded devices with the current traffic system,eliminating the need for extensive equipment updates.The solution enables real-time traffic flow monitoring and license plate recognition at the edge,synchronizing instantaneously with the cloud,allowing for intelligent adjustments of traffic signals and accident forewarnings,enhancing road utilization,and facilitating traffic flow optimization.Through on-site testing using the RK3399PRO development board and the Mobile Netv2-YOLOv4-K++F object detection algorithm,the upgrade costs of this approach are less than one-tenth of conventional methods.Under favorable weather conditions,the traffic flow detection accuracy reaches as high as 98%,with license plate recognition exceeding 80%.
文摘Herein,a thermodynamic model aimed at describing deoxidation equilibria in liquid steel was developed.The model provides explicit forms of the activity coefficient of solutes in liquid steel,eliminating the need for the minimization of internal Gibbs energy preliminarily when solving deoxidation equilibria.The elimination of internal Gibbs energy minimization is particularly advantageous during the coupling of deoxidation equilibrium calculations with computationally intensive approaches,such as computational fluid dynamics.The model enables efficient calculations through direct embedment of the explicit forms of activity coefficient in the computing code.The proposed thermodynamic model was developed using a quasichemical approach with two key approximations:random mixing of metallic elements(Fe and oxidizing metal) and strong nonrandom pairing of metal and oxygen as nearest neighbors.Through these approximations,the quasichemical approach yielded the activity coefficients of solutes as explicit functions of composition and temperature without requiring the minimization of internal Gibbs energy or the coupling of separate programs.The model was successfully applied in the calculation of deoxidation equilibria of various elements(Al,B,C,Ca,Ce,Cr,La,Mg,Mn,Nb,Si,Ti,V,and Zr).The limitations of the model arising from these assumptions were also discussed.
基金National Key Research and Development Plan of China, Grant/Award Number: 2021YFB3600503National Natural Science Foundation of China, Grant/Award Numbers: 62276065, U21A20472。
文摘Attention mechanism has been a successful method for multimodal affective analysis in recent years. Despite the advances, several significant challenges remain in fusing language and its nonverbal context information. One is to generate sparse attention coefficients associated with acoustic and visual modalities, which helps locate critical emotional se-mantics. The other is fusing complementary cross‐modal representation to construct optimal salient feature combinations of multiple modalities. A Conditional Transformer Fusion Network is proposed to handle these problems. Firstly, the authors equip the transformer module with CNN layers to enhance the detection of subtle signal patterns in nonverbal sequences. Secondly, sentiment words are utilised as context conditions to guide the computation of cross‐modal attention. As a result, the located nonverbal fea-tures are not only salient but also complementary to sentiment words directly. Experi-mental results show that the authors’ method achieves state‐of‐the‐art performance on several multimodal affective analysis datasets.
基金We thank Ying Zhang,Chao Liu,and Ping Qiu for their assistance for the manuscript.
文摘The development of spatial transcriptomics(ST)technologies has transformed genetic research from a single-cell data level to a two-dimensional spatial coordinate system and facilitated the study of the composition and function of various cell subsets in different environments and organs.The large-scale data generated by these ST technologies,which contain spatial gene expression information,have elicited the need for spatially resolved approaches to meet the requirements of computational and biological data interpretation.These requirements include dealing with the explosive growth of data to determine the cell-level and gene-level expression,correcting the inner batch effect and loss of expression to improve the data quality,conducting efficient interpretation and in-depth knowledge mining both at the single-cell and tissue-wide levels,and conducting multi-omics integration analysis to provide an extensible framework toward the in-depth understanding of biological processes.However,algorithms designed specifically for ST technologies to meet these requirements are still in their infancy.Here,we review computational approaches to these problems in light of corresponding issues and challenges,and present forward-looking insights into algorithm development.