Search alternatives:
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
modeling algorithm » scheduling algorithm (Expand Search)
method algorithm » mould algorithm (Expand Search)
element » elements (Expand Search)
update » updated (Expand Search)
-
1
-
2
-
3
Minimizing Deadline Misses of Mobile IoT Requests in a Hybrid Fog- Cloud Computing Environment
Published 2019Get full text
doctoralThesis -
4
Scheduling IoT Requests to Minimize Latency in Fog Computing
Published 2017Get full text
doctoralThesis -
5
Exposure of Botnets in Cloud Environment by Expending Trust Model with CANFES Classification Approach
Published 2022“…The goal is to be able to detect a larger range of bots and botnets by relying on several techniques called trust model. On this work, the port access verification in trust model is achieved by a Heuristic factorizing algorithm which verifies the port accessibility between client-end-user and client server. …”
-
6
-
7
Energy-Efficient Computation Offloading in Vehicular Edge Cloud Computing
Published 2020“…In this article, we study an adaptive wireless resource allocation strategy of computation offloading service under a three-layered vehicular edge cloud computing framework. We model the computation offloading process at the minimum assignable wireless resource block level, which can better adapt to vehicular computation offloading scenarios and can also rapidly evolve to the 5G network. …”
-
8
TIDCS: A Dynamic Intrusion Detection and Classification System Based Feature Selection
Published 2020Subjects: -
9
-
10
A reduced model for phase-change problems with radiation using simplified PN approximations
Published 2025“…The integro-differential equation for the full radiative transfer is replaced by a set of differential equations which are independent of the angle variable and easy to solve using conventional computational methods. To solve the coupled equations, we implement a second-order implicit scheme for the time integration and a mixed finite element method for the space discretization. …”
Get full text
article -
11
A smart decentralized identifiable distributed ledger technology‐based blockchain (DIDLT‐BC) model for cloud‐IoT security
Published 2024“…Therefore, the proposed work aims to develop a Decentralized Identifiable Distributed Ledger Technology‐Blockchain (DIDLT‐BC) framework that is intelligent and effective, requiring the least amount of computing complexity to ensure cloud IoT system safety. In this case, the Rabin algorithm produces the digital signature needed to start the transaction. …”
-
12
Extended Behavioral Modeling of FET and Lattice-Mismatched HEMT Devices
Published 2016Subjects: Get full text
doctoralThesis -
13
Brain Source Localization in the Presence of Leadfield Perturbations
Published 2015Get full text
doctoralThesis -
14
Monitoring Bone Density Using Microwave Tomography of Human Legs: A Numerical Feasibility Study
Published 2021“…This study was performed using an in-house finite-element method contrast source inversion algorithm (FEM-CSI). …”
Get full text
article -
15
Virtualizing and Scheduling FPGA Resources in Cloud Computing Datacenters
Published 2021Get full text
doctoralThesis -
16
The Use of Microwave Tomography in Bone Healing Monitoring
Published 2019Get full text
doctoralThesis -
17
-
18
Evaluation of Aerosol Optical Depth and Aerosol Models from VIIRS Retrieval Algorithms over North China Plain
Published 2017“…The overestimation of SSA but positive AOD MB of VIIRS_EDR indicate that other factors (e.g., surface reflectance characterization or cloud contamination) are important sources of error in the VIIRS_EDR algorithm, and their effects on aerosol retrievals may override the effects from non-ideality in these aerosol models.…”
-
19
Design of adaptive arrays based on element position perturbations
Published 1993“…The main advantage of using this technique over the other commonly used methods is that the amplitudes and phases of the array elements can be used mainly to steer the main beam towards the desired signal. …”
Get full text
Get full text
article -
20
Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment
Published 2023“…This paper demonstrated the results of executing various machine learning algorithms and proposed an enormously boosted neural network. …”