Results 1 to 10 of about 184,016 (328)

Computational complexity of network vulnerability analysis

open access: yesActa Universitatis Sapientiae: Informatica, 2022
Residual closeness is recently proposed as a vulnerability measure to characterize the stability of complex networks. Residual closeness is essential in the analysis of complex networks, but costly to compute.
Berberler Murat Erşen
doaj   +3 more sources

Enhancement of groundwater resources quality prediction by machine learning models on the basis of an improved DRASTIC method [PDF]

open access: yesScientific Reports
Determining situation of groundwater vulnerability plays a crucial role in studying the groundwater resource management. Generally, the preparation of reliable groundwater vulnerability maps provides targeted and practical scientific measures for the ...
Ali Bakhtiarizadeh   +2 more
doaj   +2 more sources

INTEGRATED ESTIMATION OF SEISMIC PHYSICAL VULNERABILITY OF TEHRAN USING RULE BASED GRANULAR COMPUTING [PDF]

open access: diamondThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2015
Tehran, the capital of Iran, is surrounded by the North Tehran fault, the Mosha fault and the Rey fault. This exposes the city to possibly huge earthquakes followed by dramatic human loss and physical damage, in particular as it contains a large number ...
H. Sheikhian, M. R. Delavar, A. Stein
doaj   +3 more sources

UNCERTAINTY MANAGEMENT IN SEISMIC VULNERABILITY ASSESSMENT USING GRANULAR COMPUTING BASED ON COVERING OF UNIVERSE [PDF]

open access: diamondThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2013
Earthquake is an abrupt displacement of the earth's crust caused by the discharge of strain collected along faults or by volcanic eruptions. Earthquake as a recurring natural cataclysm has always been a matter of concern in Tehran, capital of Iran, as a ...
F. Khamespanah, M. R. Delavar, M. Zare
doaj   +3 more sources

Security Threats on Cloud Computing Vulnerabilities [PDF]

open access: bronzeInternational Journal of Computer Science and Information Technology, 2013
Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications, development of customized computer software, and creation of a “realistic” network environment.
Te‐Shun Chou
openalex   +2 more sources

Algorithm for determining the degree of vulnerability of cloud computing areas based on the electre i method

open access: diamondВестник Дагестанского государственного технического университета: Технические науки
Objective. In decision making when comparing alternatives, it is often necessary to work with different values or estimates that are still important.
S. V. Razumnikov
doaj   +2 more sources

Enhancing Microservice Security Through Vulnerability-Driven Trust in the Service Mesh Architecture [PDF]

open access: yesSensors
Cloud-native computing enhances the deployment of microservice architecture (MSA) applications by improving scalability and resilience, particularly in Beyond 5G (B5G) environments such as Sixth-Generation (6G) networks.
Rami Alboqmi, Rose F. Gamble
doaj   +2 more sources

Cloud Computing Security Aspects, Vulnerabilities and Countermeasures

open access: bronzeInternational Journal of Computer Applications, 2015
Security issue in cloud computing is an active area of research. Thousands of users are connecting to a cloud daily for their day to day work. Unfortunately they are ignorant about the risk involved while doing transactions on the internet. End user systems as well as cloud based data centers must be able to overcome the threats due to Viruses, Trojan ...
Sarang V.Hatwar, Radhika Chavan
openalex   +3 more sources

Adversarial attacks and defenses in physiological computing: a systematic review

open access: yesNational Science Open, 2022
Physiological computing uses human physiological data as system inputs in real time. It includes, or significantly overlaps with, brain-computer interfaces, affective computing, adaptive automation, health informatics, and physiological signal based ...
Wu Dongrui   +7 more
doaj   +1 more source

PHYSICAL SEISMIC VULNERABILITY ASSESSMENT OF TEHRAN USING THE INTEGRATION OF GRANULAR COMPUTING AND INTERVAL DEMPSTER- SHAFER [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2017
Several faults exist in the vicinity of Tehran, the capital of Iran such as North Tehran, Ray, Mosha and Kahrizak. One way to assist reducing the damage caused by the earthquake is the production of a seismic vulnerability map.
M. R. Delavar   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy