Results 41 to 50 of about 611,886 (273)
The stability criteria affecting the formation of high‐entropy alloys, particularly focusing in supersaturated solid solutions produced by mechanical alloying, are analyzed. Criteria based on Hume–Rothery rules are distinguished from those derived from thermodynamic relations. The formers are generally applicable to mechanically alloyed samples.
Javier S. Blázquez +5 more
wiley +1 more source
A parallel algorithm for network traffic anomaly detection based on Isolation Forest
With the rapid development of large-scale complex networks and proliferation of various social network applications, the amount of network traffic data generated is increasing tremendously, and efficient anomaly detection on those massive network traffic
Xiaoling Tao +4 more
doaj +1 more source
Towards Defect Phase Diagrams: From Research Data Management to Automated Workflows
A research data management infrastructure is presented for the systematic integration of heterogeneous experimental and simulation data required for defect phase diagrams. The approach combines openBIS with a companion application for large‐object storage, automated metadata extraction, provenance tracking and federated data access, thereby supporting ...
Khalil Rejiba +5 more
wiley +1 more source
Cancer has increasingly been recognized as a genetic disease, influenced by lifestyle changes, dietary patterns, and environmental pollutants. Lung cancer remains one of the most lethal malignancies worldwide, necessitating precise diagnostic and ...
A. Sheryl Oliver +2 more
doaj +1 more source
Smart farming relies heavily on IoT automation and data-driven decision making, but this growing connectivity also increases exposure to cyberattacks.
Manikandan Thirumalaisamy +4 more
doaj +1 more source
Big Data: Survey, Technologies, Opportunities, and Challenges
Big Data has gained much attention from the academia and the IT industry. In the digital and computing world, information is generated and collected at a rate that rapidly exceeds the boundary range.
Nawsher Khan +7 more
doaj +1 more source
Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires
Suleman Khan +12 more
doaj +1 more source
Electronic Discovery in the Cloud [PDF]
Cloud Computing is poised to offer tremendous benefits to clients, including inexpensive access to seemingly limitless resources that are available instantly, anywhere.
Araiza, Alberto G.
core +1 more source
Surface Tension Measurement of Ti‐6Al‐4V by Falling Droplet Method in Oxygen‐Free Atmosphere
In this article, the temperature‐dependent surface tension of free falling, oscillating Ti‐6Al‐4V droplets is investigated in both argon and monosilane doped, oxygen‐free atmosphere. Droplet temperature and oscillation are captured with one single high‐speed camera, and the surface tension is calculated with Rayleigh's formula.
Johannes May +9 more
wiley +1 more source
A Game-theoretic Framework for Revenue Sharing in Edge-Cloud Computing System
We introduce a game-theoretic framework to ex- plore revenue sharing in an Edge-Cloud computing system, in which computing service providers at the edge of the Internet (edge providers) and computing service providers at the cloud (cloud providers) co ...
Cao, Zhi +3 more
core +1 more source

