Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
Showing 1 - 20 results of 69 for search '(((( element method algorithm ) OR ( element update algorithm ))) OR ( cloud modeling algorithm ))*', query time: 0.12s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach by Nagendra Prabhu Selvaraj (17542041)

    Published 2022
    “…The goal is to be able to detect a larger range of bots and botnets by relying on several techniques called trust model. On this work, the port access verification in trust model is achieved by a Heuristic factorizing algorithm which verifies the port accessibility between client-end-user and client server. …”
  6. 6
  7. 7

    Energy-Efficient Computation Offloading in Vehicular Edge Cloud Computing by Xin Li (51274)

    Published 2020
    “…In this article, we study an adaptive wireless resource allocation strategy of computation offloading service under a three-layered vehicular edge cloud computing framework. We model the computation offloading process at the minimum assignable wireless resource block level, which can better adapt to vehicular computation offloading scenarios and can also rapidly evolve to the 5G network. …”
  8. 8
  9. 9
  10. 10

    A reduced model for phase-change problems with radiation using simplified PN approximations by Belhamadia, Youssef

    Published 2025
    “…The integro-differential equation for the full radiative transfer is replaced by a set of differential equations which are independent of the angle variable and easy to solve using conventional computational methods. To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …”
    Get full text
    article
  11. 11

    A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security by Shitharth Selvarajan (14157976)

    Published 2024
    “…Therefore, the proposed work aims to develop a Decentralized Identifiable Distributed Ledger Technology‐Blockchain (DIDLT‐BC) framework that is intelligent and effective, requiring the least amount of computing complexity to ensure cloud IoT system safety. In this case, the Rabin algorithm produces the digital signature needed to start the transaction. …”
  12. 12
  13. 13
  14. 14

    Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study by Alkhodari, Mohanad Ahmed

    Published 2021
    “…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
    Get full text
    article
  15. 15
  16. 16
  17. 17
  18. 18

    Evaluation of Aerosol Optical Depth and Aerosol Models from VIIRS Retrieval Algorithms over North China Plain by Jun Zhu (84054)

    Published 2017
    “…The overestimation of SSA but positive AOD MB of VIIRS_EDR indicate that other factors (e.g., surface reflectance characterization or cloud contamination) are important sources of error in the VIIRS_EDR algorithm, and their effects on aerosol retrievals may override the effects from non-ideality in these aerosol models.…”
  19. 19

    Design of adaptive arrays based on element position perturbations by Dawoud, M.M.

    Published 1993
    “…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
    Get full text
    Get full text
    article
  20. 20

    Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment by Surjeet Dalal (4906894)

    Published 2023
    “…This paper demonstrated the results of executing various machine learning algorithms and proposed an enormously boosted neural network. …”