Showing 301 - 320 results of 544 for search '"System resource"', query time: 0.33s Refine Results
  1. 301

    A Proposal to Detect Computer Worms (Malicious Codes) Using Data Mining Classification Algorithms by Soukaena Hassan Hashim, Inas Ali Abdulmunem

    Published 2013-02-01
    “…Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). …”
    Get full text
    Article
  2. 302

    HPC Platform for Railway Safety-Critical Functionalities Based on Artificial Intelligence by Mikel Labayen, Laura Medina, Fernando Eizaguirre, José Flich, Naiara Aginako

    Published 2023-08-01
    “…The proposed technology increases the portability of railway applications into embedded systems, isolates crucial operations, and effectively and securely maintains system resources.…”
    Get full text
    Article
  3. 303

    Modeling of groundwater resources in Sirjan Basin using the dynamics systems method by Mohsen Pourkhosravani, Fatemeh Jamshidi Gohari, Nasrin Sayari, Saeedeh Abedzadeh

    Published 2023-06-01
    “…For this purpose, the study area was modeled using the dynamics method of systems, resources, and water consumption. Then, the results of model validation were presented using limit condition tests and sensitivity analysis. …”
    Get full text
    Article
  4. 304

    Risk-Based Access Control Model: A Systematic Literature Review by Hany F. Atlam, Muhammad Ajmal Azad, Madini O. Alassafi, Abdulrahman A. Alshdadi, Ahmed Alenezi

    Published 2020-06-01
    “…Recently, the risk-based access control model has attracted the attention of several organizations and researchers to provide more flexibility in accessing system resources. Therefore, this paper provides a systematic review and examination of the state-of-the-art of the risk-based access control model to provide a detailed understanding of the topic. …”
    Get full text
    Article
  5. 305

    DEMIX: Domain-Enforced Memory Isolation for Embedded System by Haeyoung Kim, Harashta Tatimma Larasati, Jonguk Park, Howon Kim, Donghyun Kwon

    Published 2023-03-01
    “…This technique isolates system resources by constraining the scope of the processor’s accessible memory into distinct units known as domains. …”
    Get full text
    Article
  6. 306

    Analysis of regulatory documents regulating the fight against COVID-19 and other healthcare tools used to manage the COVID-19 pandemic in Kazakhstan by V. V. Benberin, B. T. Kaikenov, Yu. V. Samsonov

    Published 2022-06-01
    “…Explore organizational tools for managing health system resources to fight the COVID‑19 pandemic in Kazakhstan.Materials and methods. …”
    Get full text
    Article
  7. 307

    Energy Tree Dynamics of Smart Grid Based on Industrial Internet of Things by Yang Wang, Peng Zeng, Haibin Yu, Yanyu Zhang, Xu Wang

    Published 2013-08-01
    “…Ontology-based semantic contexts allocate knowledge-supported attributes to energy resources, including systems, resources, and users. The key objective of context awareness is to align attributes and to intensify couplings between different energy resources by decomposing and aggregating internal ontology models. …”
    Get full text
    Article
  8. 308

    A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions by Jahanzeb Shahid, Muhammad Khurram Hameed, Ibrahim Tariq Javed, Kashif Naseer Qureshi, Moazam Ali, Noel Crespi

    Published 2022-04-01
    “…It has, therefore, become necessary to find vulnerabilities in these information system resources to guarantee information security. A publicly available web application vulnerability scanner is a computer program that assesses web application security by employing automated penetration testing techniques that reduce the time, cost, and resources required for web application penetration testing and eliminates test engineers’ dependency on human knowledge. …”
    Get full text
    Article
  9. 309

    Flexible and Dynamic Scheduling of Mixed-Criticality Systems by Xiaowen Jiang, Tianyi Sha, Dehong Liu, Junjian Chen, Chen Chen, Kai Huang

    Published 2022-10-01
    “…However, excessive pessimistic processing can lead to waste of system resources, thereby reducing the performance of functional tasks with low-criticality requirements. …”
    Get full text
    Article
  10. 310

    ModeLab - Web Tool for the Modeling of Bus Rapid Transit Systems by Carlos-Robinson Campo, Juan-Pablo Salazar, Carlos-Alberto Cobos-Lozada

    Published 2021-05-01
    “…For these systems to fulfill their mission effectively and efficiently, they need to respond adequately to the different situations that appear periodically or arbitrarily in the users’ routines, modification of system resources (e.g., buses, drivers, lanes, or roads), among others. …”
    Get full text
    Article
  11. 311

    Setting healthcare priorities in hospitals: a review of empirical studies. by Barasa, E, Molyneux, S, English, M, Cleary, S

    Published 2014
    “…This is surprising given the key role that hospitals play in the delivery of healthcare services and the large proportion of health systems resources that they absorb. To explore the factors that impact upon priority setting at the hospital level, we conducted a thematic review of empirical studies. …”
    Journal article
  12. 312

    Health system resilience: a critical review and reconceptualisation by Witter, S, Thomas, S, Topp, SM, Barasa, E, Chopra, M, Cobos, D, Blanchet, K, Teddy, G, Atun, R, Ager, A

    Published 2023
    “…We discourage the framing of resilience as an outcome that can be measured; instead, we see it emerge from systemic resources and interactions, which have effects that can be measured. …”
    Journal article
  13. 313

    Review of change detection techniques from remotely sensed images by Deilami, Bashir Rokni, Ahmad, Baharin, Saffar, Malik R. A., Umar, Hafiz Zamin

    Published 2015
    “…Among the applications making use of such data are national, regional and global monitoring systems resource monitoring platforms, changes in land use and land cover monitoring and various studies on environmental issues. …”
    Article
  14. 314

    UAV deployment model in aerial monitoring applications using camera field of view by Bashir, Muhammad Nauman, Mohamad Yusof, Kamaludin, Iqbal, Sameera

    Published 2022
    “…The network designer can choose appropriate system resources using the analytical results of this work and by optimizing various parameters.…”
    Conference or Workshop Item
  15. 315
  16. 316
  17. 317
  18. 318
  19. 319
  20. 320