-
281
NAP: Natural App Processing for Predictive User Contexts in Mobile Smartphones
Published 2020-09-01“…Predicting the next application that will be used can orient the smartphone to address the system resources to the correct application, making the system more intelligent and efficient. …”
Get full text
Article -
282
An Improved Ant Colony Algorithm for New energy Industry Resource Allocation in Cloud Environment
Published 2023-01-01“…In order to achieve cluster load balancing, utilization of system resources and improvement of system work efficiency, this paper proposes a new cloud computing allocation algorithm based on improved ant colony algorithm. …”
Get full text
Article -
283
Thread-Aware Mechanism to Enhance Inter-Node Load Balancing for Multithreaded Applications on NUMA Systems
Published 2021-07-01“…NUMA multi-core systems divide system resources into several nodes. When an imbalance in the load between cores occurs, the kernel scheduler’s load balancing mechanism then migrates threads between cores or across NUMA nodes. …”
Get full text
Article -
284
Chidroid: A Mobile Android Application for Log Collection and Security Analysis in Healthcare and IoMT
Published 2023-02-01“…This research introduces a way to perform a security analysis on Android devices that uses minimal system resources and reduces battery consumption by pushing the analysis stage to the edge.…”
Get full text
Article -
285
Cuisine in transition? Organic residue analysis of domestic containers from 9th-14th century Sicily
Published 2023-03-01“…Thus, lending to the idea that post-Islamic populations largely flourished and benefited from the agricultural systems, resources and recipes left by their predecessors.…”
Get full text
Article -
286
Innovations for Grid Security from Trusted Computing Protocol Solutions to Sharing of Security Resource
Published 2009“…The TC initiative developed by the Trusted Computing Group (TCG) takes a distributed-system-wide approach to the provisions of integrity protection for systems, resources and services. Trust established from TC is much stronger than that described above: it is about conformed behaviors of a principal such that the principal is prohibited from acting against the granted interests of other principals it serves. …”
Journal article -
287
-
288
An early warning signal for grassland degradation on the Qinghai-Tibetan Plateau
Published 2023-10-01Get full text
Article -
289
-
290
-
291
Cost analysis of implementation of a population level rabies control programme for children in India
Published 2023-03-01Get full text
Article -
292
Fast Detection of Tomato Sucker Using Semantic Segmentation Neural Networks Based on RGB-D Images
Published 2022-07-01“…It requires low system resources and is suitable for the tomato dataset. …”
Get full text
Article -
293
Adapting Santiago Method to Determine Appropriate and Resource Efficient Sanitation Systems for an Urban Settlement in Lima Peru
Published 2021-04-01“…To further evaluate these 17 systems, resource recovery and loss potentials are quantified. …”
Get full text
Article -
294
A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience
Published 2023-08-01“…Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target business data and system resources. Cyber threat intelligence (CTI) enhances organizational cybersecurity resilience by obtaining, processing, evaluating, and disseminating information about potential risks and opportunities inside the cyber domain. …”
Get full text
Article -
295
Analysis of Medical Consultation Patterns in Medical and Surgical Intensive Care Units: Changes in the Pattern of Consultation after the Implementation of Intensivist-Directed Care
Published 2021-11-01“…Conclusion Analysis of consultation patterns is an important method of assessing the complexity and severity of illnesses, and of evaluating the needs of available health system resources. Based on our findings, we suggest the development of an appropriate protocol for frequently consulted services.…”
Get full text
Article -
296
Secure data storage and access for fish monitoring in cloud environment
Published 2023-06-01“…Cloud computing (CC) refers to the on-demand availability of computer system resources, specifically data storage and computational power, without the user's direct active administration. …”
Get full text
Article -
297
A New Meta-Heuristic Algorithm Based on Tabu Search for the Job Scheduling Problem in a Fog-Cloud system
Published 2020-10-01“…In addition, one of the key issues for creating such systems at a high speed and minimum time is to allocate appropriate system resources to user requests and, as a result, load balances in the system. …”
Get full text
Article -
298
Integrated cloud computing and blockchain systems: A review
Published 2023-01-01“…On the other hand, cloud computing is the on-demand availability of shared computer system resources, although issues now beset it in automation, processes, management, policies, and human aspects. …”
Get full text
Article -
299
A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography
Published 2022-02-01“…It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly. …”
Get full text
Article -
300
Joint Transmit Resources and Trajectory Planning for Target Tracking in Airborne Radar Networks
Published 2022-10-01“…This is done to minimize the target estimation error BCRLB under the constraints of given system resources, aircraft maneuvering and intercept probability threshold, thereby improving the target tracking accuracy of airborne radar network. …”
Get full text
Article