Results 31 to 40 of about 97,608 (330)

State Variation Mining: On Information Divergence with Message Importance in Big Data

open access: yes, 2018
Information transfer which reveals the state variation of variables usually plays a vital role in big data analytics and processing. In fact, the measures for information transfer could reflect the system change by use of the variable distributions ...
Fan, Pingyi, Liu, Shanyun, She, Rui
core   +1 more source

A comprehensive approach in performance evaluation for modernreal-time operating systems [PDF]

open access: yes, 1996
In real-time computing the accurate characterization of the performance and determinism that a particular real-time operating system/hardware combination can provide for real-time applications is essential.
Conde, Jesús F.   +2 more
core   +2 more sources

Improved malicious node detection method for detecting a bait in an extensive network for getting the maximum throughput

open access: yesIET Communications, EarlyView., 2022
Abstract Mobile Ad‐hoc Network (MANET) is an ad hoc Wireless subset with a unique dynamic geometry of the system and movable nodes. The MANETs are auto‐organized networks that permit mobility without infrastructure. Specific protocols for MANET routing are provided with these attributes.
Shalini Goel   +5 more
wiley   +1 more source

Adaptive message sending rate control method based on channel congestion cost calculation in VANET

open access: yesTongxin xuebao, 2016
In VANET,sending beacon messages reliably played a vital role in cooperative awareness and collision avoidance,and changes of vehicle density in real traffic environment had a direct impact on channel load and will cause the channel congestion to a ...
Ming-jian LIU   +4 more
doaj   +2 more sources

Hyper-Scalable JSQ with Sparse Feedback

open access: yes, 2019
Load balancing algorithms play a vital role in enhancing performance in data centers and cloud networks. Due to the massive size of these systems, scalability challenges, and especially the communication overhead associated with load balancing mechanisms,
Borst, Sem   +2 more
core   +1 more source

A Factory-based Approach to Support E-commerce Agent Fabrication [PDF]

open access: yes, 2004
With the development of Internet computing and software agent technologies, agent-based e-commerce is emerging. How to create agents for e-commerce applications has become an important issue along the way to success.
Bradshaw   +17 more
core   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Combining Several Substitution Cipher Algorithms using Circular Queue Data Structure

open access: yesمجلة بغداد للعلوم, 2020
With the revolutionized expansion of the Internet, worldwide information increases the application of communication technology, and the rapid growth of significant data volume boosts the requirement to accomplish secure, robust, and confident techniques ...
Noor Ibraheem, Mokhtar Hasan
doaj   +1 more source

The method of intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement

open access: yesIET Networks, EarlyView., 2022
Abstract This research aims to study the intelligent wireless sensor to improve the water permeability of permeable asphalt concrete pavement. The water permeability of pavement is extremely important for the traffic environment. This study first briefly introduces the background and significance analysis, and then exemplifies the deployment algorithm ...
Xingmei Zhang, Cong Xu, Qi Lei
wiley   +1 more source

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy