-
301
A Proposal to Detect Computer Worms (Malicious Codes) Using Data Mining Classification Algorithms
Published 2013-02-01“…Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). …”
Get full text
Article -
302
HPC Platform for Railway Safety-Critical Functionalities Based on Artificial Intelligence
Published 2023-08-01“…The proposed technology increases the portability of railway applications into embedded systems, isolates crucial operations, and effectively and securely maintains system resources.…”
Get full text
Article -
303
Modeling of groundwater resources in Sirjan Basin using the dynamics systems method
Published 2023-06-01“…For this purpose, the study area was modeled using the dynamics method of systems, resources, and water consumption. Then, the results of model validation were presented using limit condition tests and sensitivity analysis. …”
Get full text
Article -
304
Risk-Based Access Control Model: A Systematic Literature Review
Published 2020-06-01“…Recently, the risk-based access control model has attracted the attention of several organizations and researchers to provide more flexibility in accessing system resources. Therefore, this paper provides a systematic review and examination of the state-of-the-art of the risk-based access control model to provide a detailed understanding of the topic. …”
Get full text
Article -
305
DEMIX: Domain-Enforced Memory Isolation for Embedded System
Published 2023-03-01“…This technique isolates system resources by constraining the scope of the processor’s accessible memory into distinct units known as domains. …”
Get full text
Article -
306
Analysis of regulatory documents regulating the fight against COVID-19 and other healthcare tools used to manage the COVID-19 pandemic in Kazakhstan
Published 2022-06-01“…Explore organizational tools for managing health system resources to fight the COVID‑19 pandemic in Kazakhstan.Materials and methods. …”
Get full text
Article -
307
Energy Tree Dynamics of Smart Grid Based on Industrial Internet of Things
Published 2013-08-01“…Ontology-based semantic contexts allocate knowledge-supported attributes to energy resources, including systems, resources, and users. The key objective of context awareness is to align attributes and to intensify couplings between different energy resources by decomposing and aggregating internal ontology models. …”
Get full text
Article -
308
A Comparative Study of Web Application Security Parameters: Current Trends and Future Directions
Published 2022-04-01“…It has, therefore, become necessary to find vulnerabilities in these information system resources to guarantee information security. A publicly available web application vulnerability scanner is a computer program that assesses web application security by employing automated penetration testing techniques that reduce the time, cost, and resources required for web application penetration testing and eliminates test engineers’ dependency on human knowledge. …”
Get full text
Article -
309
Flexible and Dynamic Scheduling of Mixed-Criticality Systems
Published 2022-10-01“…However, excessive pessimistic processing can lead to waste of system resources, thereby reducing the performance of functional tasks with low-criticality requirements. …”
Get full text
Article -
310
ModeLab - Web Tool for the Modeling of Bus Rapid Transit Systems
Published 2021-05-01“…For these systems to fulfill their mission effectively and efficiently, they need to respond adequately to the different situations that appear periodically or arbitrarily in the users’ routines, modification of system resources (e.g., buses, drivers, lanes, or roads), among others. …”
Get full text
Article -
311
Setting healthcare priorities in hospitals: a review of empirical studies.
Published 2014“…This is surprising given the key role that hospitals play in the delivery of healthcare services and the large proportion of health systems resources that they absorb. To explore the factors that impact upon priority setting at the hospital level, we conducted a thematic review of empirical studies. …”
Journal article -
312
Health system resilience: a critical review and reconceptualisation
Published 2023“…We discourage the framing of resilience as an outcome that can be measured; instead, we see it emerge from systemic resources and interactions, which have effects that can be measured. …”
Journal article -
313
Review of change detection techniques from remotely sensed images
Published 2015“…Among the applications making use of such data are national, regional and global monitoring systems resource monitoring platforms, changes in land use and land cover monitoring and various studies on environmental issues. …”
Article -
314
UAV deployment model in aerial monitoring applications using camera field of view
Published 2022“…The network designer can choose appropriate system resources using the analytical results of this work and by optimizing various parameters.…”
Conference or Workshop Item -
315
Land-Atmosphere Interactions and Effects on the Climate of the Tibetan Plateau and Surrounding Regions
Published 2023-01-01Get full text
Article -
316
-
317
Editorial: Lake Changes, Drivers and Consequences in High Mountain Asia
Published 2022-05-01Get full text
Article -
318
-
319
Comparative analysis of indices in capturing the onset and withdrawal of the South Asian Summer Monsoon
Published 2024-01-01Get full text
Article -
320