-
341
A COUGH-BASED COVID-19 DETECTION SYSTEM USING PCA AND MACHINE LEARNING CLASSIFIERS
Published 2022-12-01“…Medical and health services face difficulties to manage the disease, which requires a significant amount of health system resources. Several artificial intelligence-based systems are designed to automatically detect COVID-19 for limiting the spread of the virus. …”
Get full text
Article -
342
Small Private Key MQPKS on an Embedded Microprocessor
Published 2014-03-01“…Multivariate quadratic (MQ) cryptography requires the use of long public and private keys to ensure a sufficient security level, but this is not favorable to embedded systems, which have limited system resources. Recently, various approaches to MQ cryptography using reduced public keys have been studied. …”
Get full text
Article -
343
Vnode: Low-Overhead Transparent Tracing of Node.js-Based Microservice Architectures
Published 2023-12-01“…Compared to other methods, our approach incurs an overhead of approximately 5% on the system for the trace collection infrastructure while exhibiting minimal utilization of system resources during analysis execution. Experiments demonstrate that our technique scales well with very large trace files containing huge numbers of events and performs analyses in very acceptable timeframes.…”
Get full text
Article -
344
FITing-Tree: A Data-aware Index Structure
Published 2021“…However, building several indexes over large datasets can often become prohibitive and consume valuable system resources. In fact, a recent study showed that indexes created as part of the TPC-C benchmark can account for 55% of the total memory available in a modern DBMS. …”
Get full text
Article -
345
FITing-Tree: A Data-aware Index Structure
Published 2022“…However, building several indexes over large datasets can often become prohibitive and consume valuable system resources. In fact, a recent study showed that indexes created as part of the TPC-C benchmark can account for 55% of the total memory available in a modern DBMS. …”
Get full text
Article -
346
-
347
-
348
-
349
Comparison of prokaryotes between Mount Everest and the Mariana Trench
Published 2022-12-01Get full text
Article -
350
Plant colonization mediates the microbial community dynamics in glacier forelands of the Tibetan Plateau
Published 2023-02-01Get full text
Article -
351
-
352
An Assessment of Glacier Inventories for the Third Pole Region
Published 2022-04-01Get full text
Article -
353
-
354
-
355
AE-DTI: An Efficient Darknet Traffic Identification Method Based on Autoencoder Improvement
Published 2023-08-01“…However, existing darknet traffic identification methods rely on all traffic characteristics, which require a long computing time and a large amount of system resources, resulting in low identification efficiency. …”
Get full text
Article -
356
A Comprehensive Analysis of the Android Permissions System
Published 2020-01-01“…Android permissions system is a core security component that offers an access-control mechanism to protect system resources and users’ privacy. As such, it has experienced continuous change over each Android release. …”
Get full text
Article -
357
A Stochastic Energy Storage Capacity Sizing in Smart Grid
Published 2019-03-01“…Energy storage sizing is performed under various rejection probabilities and system resources. The results reveal that obtaining the right size of energy storage system is highly related to customer’s electricity consumption patterns. …”
Get full text
Article -
358
Securing Embedded System from Code Reuse Attacks: A Lightweight Scheme with Hardware Assistance
Published 2023-07-01“…When designing and implementing the security mechanism for embedded systems, we fully consider the constraints of limited system resources and performance, optimizing both the architecture design and implementation of the proposed hardware. …”
Get full text
Article -
359
Research on identity authentication system of Internet of Things based on blockchain technology
Published 2022-11-01“…Finally, this article also uses an accountability mechanism to punish some attackers who attempt to waste system resources by revealing the real identity of the attacker and refusing to serve him. …”
Get full text
Article -
360
Defining Uncertainty: Comparing Resource/Reserve Classification Systems for Coal and Coal Seam Gas
Published 2021-09-01“…Generally, in either system, resources are considered to have potential for eventual commercial production, but this has not yet been confirmed. …”
Get full text
Article