Showing 341 - 360 results of 544 for search '"System resource"', query time: 0.20s Refine Results
  1. 341

    A COUGH-BASED COVID-19 DETECTION SYSTEM USING PCA AND MACHINE LEARNING CLASSIFIERS by Elmehdi BENMALEK, Jamal EL MHAMDI, Abdelilah JILBAB, Atman JBARI

    Published 2022-12-01
    “…Medical and health services face difficulties to manage the disease, which requires a significant amount of health system resources. Several artificial intelligence-based systems are designed to automatically detect COVID-19 for limiting the spread of the virus. …”
    Get full text
    Article
  2. 342

    Small Private Key MQPKS on an Embedded Microprocessor by Hwajeong Seo, Jihyun Kim, Jongseok Choi, Taehwan Park, Zhe Liu, Howon Kim

    Published 2014-03-01
    “…Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. …”
    Get full text
    Article
  3. 343

    Vnode: Low-Overhead Transparent Tracing of Node.js-Based Microservice Architectures by Herve M. Kabamba, Matthew Khouzam, Michel R. Dagenais

    Published 2023-12-01
    “…Compared to other methods, our approach incurs an overhead of approximately 5% on the system for the trace collection infrastructure while exhibiting minimal utilization of system resources during analysis execution. Experiments demonstrate that our technique scales well with very large trace files containing huge numbers of events and performs analyses in very acceptable timeframes.…”
    Get full text
    Article
  4. 344

    FITing-Tree: A Data-aware Index Structure by Galakatos, Alex, Markovitch, Michael, Binnig, Carsten, Fonseca, Rodrigo, Kraska, Tim

    Published 2021
    “…However, building several indexes over large datasets can often become prohibitive and consume valuable system resources. In fact, a recent study showed that indexes created as part of the TPC-C benchmark can account for 55% of the total memory available in a modern DBMS. …”
    Get full text
    Article
  5. 345

    FITing-Tree: A Data-aware Index Structure by Galakatos, Alex, Markovitch, Michael, Binnig, Carsten, Fonseca, Rodrigo, Kraska, Tim

    Published 2022
    “…However, building several indexes over large datasets can often become prohibitive and consume valuable system resources. In fact, a recent study showed that indexes created as part of the TPC-C benchmark can account for 55% of the total memory available in a modern DBMS. …”
    Get full text
    Article
  6. 346
  7. 347
  8. 348
  9. 349
  10. 350
  11. 351
  12. 352
  13. 353
  14. 354
  15. 355

    AE-DTI: An Efficient Darknet Traffic Identification Method Based on Autoencoder Improvement by Tao Yang, Rui Jiang, Hongli Deng, Qinru Li, Ziyu Liu

    Published 2023-08-01
    “…However, existing darknet traffic identification methods rely on all traffic characteristics, which require a long computing time and a large amount of system resources, resulting in low identification efficiency. …”
    Get full text
    Article
  16. 356

    A Comprehensive Analysis of the Android Permissions System by Iman M. Almomani, Aala Al Khayer

    Published 2020-01-01
    “…Android permissions system is a core security component that offers an access-control mechanism to protect system resources and users’ privacy. As such, it has experienced continuous change over each Android release. …”
    Get full text
    Article
  17. 357

    A Stochastic Energy Storage Capacity Sizing in Smart Grid by Islam Şafak BAYRAM

    Published 2019-03-01
    “…Energy storage sizing is performed under various rejection probabilities and system resources. The results reveal that obtaining the right size of energy storage system is highly related to customer’s electricity consumption patterns. …”
    Get full text
    Article
  18. 358

    Securing Embedded System from Code Reuse Attacks: A Lightweight Scheme with Hardware Assistance by Zhenliang An, Weike Wang, Wenxin Li, Senyang Li, Dexue Zhang

    Published 2023-07-01
    “…When designing and implementing the security mechanism for embedded systems, we fully consider the constraints of limited system resources and performance, optimizing both the architecture design and implementation of the proposed hardware. …”
    Get full text
    Article
  19. 359

    Research on identity authentication system of Internet of Things based on blockchain technology by Liu Yanhui, Zhang Jianbiao, Muhammad Salman Pathan, Yuan Yijian, Zhang Puzhe, Sarah Maroc, Avishek Nag

    Published 2022-11-01
    “…Finally, this article also uses an accountability mechanism to punish some attackers who attempt to waste system resources by revealing the real identity of the attacker and refusing to serve him. …”
    Get full text
    Article
  20. 360

    Defining Uncertainty: Comparing Resource/Reserve Classification Systems for Coal and Coal Seam Gas by Tim A. Moore, Mike C. Friederich

    Published 2021-09-01
    “…Generally, in either system, resources are considered to have potential for eventual commercial production, but this has not yet been confirmed. …”
    Get full text
    Article