Showing 281 - 300 results of 544 for search '"System resource"', query time: 0.49s Refine Results
  1. 281

    NAP: Natural App Processing for Predictive User Contexts in Mobile Smartphones by Gabriel S. Moreira, Heeseung Jo, Jinkyu Jeong

    Published 2020-09-01
    “…Predicting the next application that will be used can orient the smartphone to address the system resources to the correct application, making the system more intelligent and efficient. …”
    Get full text
    Article
  2. 282

    An Improved Ant Colony Algorithm for New energy Industry Resource Allocation in Cloud Environment by Haoyang Du, Junhui Chen

    Published 2023-01-01
    “…In order to achieve cluster load balancing, utilization of system resources and improvement of system work efficiency, this paper proposes a new cloud computing allocation algorithm based on improved ant colony algorithm. …”
    Get full text
    Article
  3. 283

    Thread-Aware Mechanism to Enhance Inter-Node Load Balancing for Multithreaded Applications on NUMA Systems by Mei-Ling Chiang, Wei-Lun Su

    Published 2021-07-01
    “…NUMA multi-core systems divide system resources into several nodes. When an imbalance in the load between cores occurs, the kernel scheduler’s load balancing mechanism then migrates threads between cores or across NUMA nodes. …”
    Get full text
    Article
  4. 284

    Chidroid: A Mobile Android Application for Log Collection and Security Analysis in Healthcare and IoMT by Stylianos Karagiannis, Luís Landeiro Ribeiro, Christoforos Ntantogian, Emmanouil Magkos, Luís Miguel Campos

    Published 2023-02-01
    “…This research introduces a way to perform a security analysis on Android devices that uses minimal system resources and reduces battery consumption by pushing the analysis stage to the edge.…”
    Get full text
    Article
  5. 285

    Cuisine in transition? Organic residue analysis of domestic containers from 9th-14th century Sicily by Jasmine Lundy, Lea Drieu, Paola Orecchioni, Antonino Meo, Veronica Aniceti, Girolamo Fiorentino, Milena Primavera, Helen Talbot, Alessandra Molinari, Martin O. H. Carver, Oliver E. Craig

    Published 2023-03-01
    “…Thus, lending to the idea that post-Islamic populations largely flourished and benefited from the agricultural systems, resources and recipes left by their predecessors.…”
    Get full text
    Article
  6. 286

    Innovations for Grid Security from Trusted Computing Protocol Solutions to Sharing of Security Resource by Mao, W, Martin, A, Jin, H, Zhang, H

    Published 2009
    “…The TC initiative developed by the Trusted Computing Group (TCG) takes a distributed-system-wide approach to the provisions of integrity protection for systems, resources and services. Trust established from TC is much stronger than that described above: it is about conformed behaviors of a principal such that the principal is prohibited from acting against the granted interests of other principals it serves. …”
    Journal article
  7. 287
  8. 288
  9. 289
  10. 290
  11. 291
  12. 292

    Fast Detection of Tomato Sucker Using Semantic Segmentation Neural Networks Based on RGB-D Images by Truong Thi Huong Giang, Tran Quoc Khai, Dae-Young Im, Young-Jae Ryoo

    Published 2022-07-01
    “…It requires low system resources and is suitable for the tomato dataset. …”
    Get full text
    Article
  13. 293

    Adapting Santiago Method to Determine Appropriate and Resource Efficient Sanitation Systems for an Urban Settlement in Lima Peru by Ainul Firdatun Nisaa, Manuel Krauss, Dorothee Spuhler

    Published 2021-04-01
    “…To further evaluate these 17 systems, resource recovery and loss potentials are quantified. …”
    Get full text
    Article
  14. 294

    A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience by Saqib Saeed, Sarah A. Suayyid, Manal S. Al-Ghamdi, Hayfa Al-Muhaisen, Abdullah M. Almuhaideb

    Published 2023-08-01
    “…Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target business data and system resources. Cyber threat intelligence (CTI) enhances organizational cybersecurity resilience by obtaining, processing, evaluating, and disseminating information about potential risks and opportunities inside the cyber domain. …”
    Get full text
    Article
  15. 295

    Analysis of Medical Consultation Patterns in Medical and Surgical Intensive Care Units: Changes in the Pattern of Consultation after the Implementation of Intensivist-Directed Care by Min-Jung Bang, So-Kyung Yoon, Kyoung Won Yoon, Eunmi Gil, Keesang Yoo, Kyoung Jin Choi, Chi-Min Park

    Published 2021-11-01
    “…Conclusion Analysis of consultation patterns is an important method of assessing the complexity and severity of illnesses, and of evaluating the needs of available health system resources. Based on our findings, we suggest the development of an appropriate protocol for frequently consulted services.…”
    Get full text
    Article
  16. 296

    Secure data storage and access for fish monitoring in cloud environment by K.S. Saraswathy, S.S. Sujatha

    Published 2023-06-01
    “…Cloud computing (CC) refers to the on-demand availability of computer system resources, specifically data storage and computational power, without the user's direct active administration. …”
    Get full text
    Article
  17. 297

    A New Meta-Heuristic Algorithm Based on Tabu Search for the Job Scheduling Problem in a Fog-Cloud system by Seydeh Samira Mohammadi, Mahmood Deypir

    Published 2020-10-01
    “…In addition, one of the key issues for creating such systems at a high speed and minimum time is to allocate appropriate system resources to user requests and, as a result, load balances in the system. …”
    Get full text
    Article
  18. 298

    Integrated cloud computing and blockchain systems: A review by Mohammad Alshinwan, Ahmed Younes Shdefat, Nour Mostafa, Abdullah A.M AlSokkar, Tamam Alsarhan, Dmaithan Almajali

    Published 2023-01-01
    “…On the other hand, cloud computing is the on-demand availability of shared computer system resources, although issues now beset it in automation, processes, management, policies, and human aspects. …”
    Get full text
    Article
  19. 299

    A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography by Rose Adee, Haralambos Mouratidis

    Published 2022-02-01
    “…It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly. …”
    Get full text
    Article
  20. 300

    Joint Transmit Resources and Trajectory Planning for Target Tracking in Airborne Radar Networks by Chenguang SHI, Yijie WANG, Xiangrong DAI, Jianjiang ZHOU

    Published 2022-10-01
    “…This is done to minimize the target estimation error BCRLB under the constraints of given system resources, aircraft maneuvering and intercept probability threshold, thereby improving the target tracking accuracy of airborne radar network. …”
    Get full text
    Article