Results 1 to 10 of about 5,495 (60)
Fault Tolerance of Cloud Infrastructure with Machine Learning
Enhancing the fault tolerance of cloud systems and accurately forecasting cloud performance are pivotal concerns in cloud computing research. This research addresses critical concerns in cloud computing by enhancing fault tolerance and forecasting cloud ...
Kalaskar Chetankumar, Thangam S.
doaj +1 more source
One of the methods most frequently used to recommend films is collaborative filtering. We examine the potential of collaborative filtering in our paper’s discussion of product suggestions.
Amutha S., Vikram Surya R.
doaj +1 more source
This research proposes an efficient hybridized approach for symmetrical encryption of image files in bitmap formats. Due to the heavy use of lightweight encryption in fields such as military and corporate workplaces, intruders try to intercept ...
Kanshi Avaneesh +3 more
doaj +1 more source
A startup is a recently established business venture led by entrepreneurs, to create and offer new products or services. The discovery of promising startups is a challenging task for creditors, policymakers, and investors. Therefore, the startup survival
Allu Ramakrishna +1 more
doaj +1 more source
DoSRT: A Denial-of-Service Resistant Trust Model for VANET
The Denial of Service (DoS) attack threatens the availability of key components of Vehicular Ad-hoc Network (VANET). Various centralized and decentralized trust-based approaches have been proposed to secure the VANET from DoS attack.
Keshari Niharika +2 more
doaj +1 more source
Predicting students’ academic performance is a critical research area, yet imbalanced educational datasets, characterized by unequal academic-level representation, present challenges for classifiers.
Tariq Muhammad Arham +3 more
doaj +1 more source
Coevolution of Myoelectric Hand Control under the Tactile Interaction among Fingers and Objects
The usability of a prosthetic hand differs significantly from that of a real hand. Moreover, the complexity of manipulation increases as the number of degrees of freedom to be controlled increases, making manipulation with biological signals extremely ...
Yuki Kuroda +4 more
doaj +1 more source
Models of Computer Calculations
Introduction. The complexity of computational algorithms for solving typical problems of computational, applied, and discrete mathematics is analyzed from the perspective of the theory of computation, depending on the computer architecture and the used ...
Valerii Zadiraka +2 more
doaj +1 more source
An Approach for Securing JSON Objects through Chaotic Synchronization
Nowadays the interoperability of web applications is carried out by the use of data exchange formats such as XML and JavaScript Object Notation (JSON).
Gómez Omar S. +3 more
doaj +1 more source
Parallel Implementation of Sparse Distributed Memory for Semantic Storage
Introduction. Sparse Distributed Memory (SDM) and Binary Sparse Distributed Representations (Binary Sparse Distributed Representations, BSDR), as two phenomenological approaches to biological memory modelling, have many similarities.
Ruslan Vdovychenko, Vadim Tulchinsky
doaj +1 more source

