Results 41 to 50 of about 611,886 (273)

Revisiting Stability Criteria in Ball‐Milled High‐Entropy Alloys: Do Hume–Rothery and Thermodynamic Rules Equally Apply?

open access: yesAdvanced Engineering Materials, Volume 27, Issue 6, March 2025.
The stability criteria affecting the formation of high‐entropy alloys, particularly focusing in supersaturated solid solutions produced by mechanical alloying, are analyzed. Criteria based on Hume–Rothery rules are distinguished from those derived from thermodynamic relations. The formers are generally applicable to mechanically alloyed samples.
Javier S. Blázquez   +5 more
wiley   +1 more source

A parallel algorithm for network traffic anomaly detection based on Isolation Forest

open access: yesInternational Journal of Distributed Sensor Networks, 2018
With the rapid development of large-scale complex networks and proliferation of various social network applications, the amount of network traffic data generated is increasing tremendously, and efficient anomaly detection on those massive network traffic
Xiaoling Tao   +4 more
doaj   +1 more source

Towards Defect Phase Diagrams: From Research Data Management to Automated Workflows

open access: yesAdvanced Engineering Materials, EarlyView.
A research data management infrastructure is presented for the systematic integration of heterogeneous experimental and simulation data required for defect phase diagrams. The approach combines openBIS with a companion application for large‐object storage, automated metadata extraction, provenance tracking and federated data access, thereby supporting ...
Khalil Rejiba   +5 more
wiley   +1 more source

A review of enhanced biosignature immunotherapy tools for predicting lung cancer immune phenotypes using deep learning

open access: yesDiscover Oncology
Cancer has increasingly been recognized as a genetic disease, influenced by lifestyle changes, dietary patterns, and environmental pollutants. Lung cancer remains one of the most lethal malignancies worldwide, necessitating precise diagnostic and ...
A. Sheryl Oliver   +2 more
doaj   +1 more source

Fog-Aware Hierarchical Autoencoder with Density-Based Clustering for AI-Driven Threat Detection in Smart Farming IoT Systems

open access: yesFuture Internet
Smart farming relies heavily on IoT automation and data-driven decision making, but this growing connectivity also increases exposure to cyberattacks.
Manikandan Thirumalaisamy   +4 more
doaj   +1 more source

Big Data: Survey, Technologies, Opportunities, and Challenges

open access: yesThe Scientific World Journal, 2014
Big Data has gained much attention from the academia and the IT industry. In the digital and computing world, information is generated and collected at a rate that rapidly exceeds the boundary range.
Nawsher Khan   +7 more
doaj   +1 more source

Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis

open access: yesIEEE Access, 2016
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires
Suleman Khan   +12 more
doaj   +1 more source

Electronic Discovery in the Cloud [PDF]

open access: yes, 2011
Cloud Computing is poised to offer tremendous benefits to clients, including inexpensive access to seemingly limitless resources that are available instantly, anywhere.
Araiza, Alberto G.
core   +1 more source

Surface Tension Measurement of Ti‐6Al‐4V by Falling Droplet Method in Oxygen‐Free Atmosphere

open access: yesAdvanced Engineering Materials, EarlyView.
In this article, the temperature‐dependent surface tension of free falling, oscillating Ti‐6Al‐4V droplets is investigated in both argon and monosilane doped, oxygen‐free atmosphere. Droplet temperature and oscillation are captured with one single high‐speed camera, and the surface tension is calculated with Rayleigh's formula.
Johannes May   +9 more
wiley   +1 more source

A Game-theoretic Framework for Revenue Sharing in Edge-Cloud Computing System

open access: yes, 2018
We introduce a game-theoretic framework to ex- plore revenue sharing in an Edge-Cloud computing system, in which computing service providers at the edge of the Internet (edge providers) and computing service providers at the cloud (cloud providers) co ...
Cao, Zhi   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy