Results 11 to 20 of about 23,723 (266)

UNCERTAINTY HANDLING IN DISASTER MANAGEMENT USING HIERARCHICAL ROUGH SET GRANULATION [PDF]

open access: yesISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2015
Uncertainty is one of the main concerns in geospatial data analysis. It affects different parts of decision making based on such data. In this paper, a new methodology to handle uncertainty for multi-criteria decision making problems is proposed.
H. Sheikhian, M. R. Delavar, A. Stein
doaj   +1 more source

Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis

open access: yesFuture Internet, 2022
Life without computers is unimaginable. However, computers remain vulnerable to cybercrimes, a USD 6 trillion industry that the world has come to accept as a “necessary evil”.
Fazal Raheman   +3 more
doaj   +1 more source

ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing

open access: yesFuture Internet, 2019
Many companies are adapting cloud computing technology because moving to the cloud has an array of benefits. During decision-making, having processed for adopting cloud computing, the importance of risk management is progressively recognized.
Masky Mackita   +2 more
doaj   +1 more source

A novel fault-tolerant scheduling approach for collaborative workflows in an edge-IoT environment

open access: yesDigital Communications and Networks, 2022
As a newly emerging computing paradigm, edge computing shows great capability in supporting and boosting 5G and Internet-of-Things (IoT) oriented applications, e.g., scientific workflows with low-latency, elastic, and on-demand provisioning of ...
Tingyan Long   +8 more
doaj   +1 more source

Revisiting Employment Vulnerability Index Using Principal Component Analysis

open access: yesJPAIR, 2020
The share of workers in vulnerable employment is directly linked to the share of people living in poverty. The statement recalls why understanding the employment vulnerability index (EVI) of a nation based on the present situations is very relevant.
Glecil Joy Dalupo, Gary Garcia
doaj   +1 more source

PSOFuzzer: A Target-Oriented Software Vulnerability Detection Technology Based on Particle Swarm Optimization

open access: yesApplied Sciences, 2021
Coverage-oriented and target-oriented fuzzing are widely used in vulnerability detection. Compared with coverage-oriented fuzzing, target-oriented fuzzing concentrates more computing resources on suspected vulnerable points to improve the testing ...
Chen Chen, Han Xu, Baojiang Cui
doaj   +1 more source

Algorithm for determining the degree of vulnerability of cloud computing areas based on the electre i method

open access: yesВестник Дагестанского государственного технического университета: Технические науки
Objective. In decision making when comparing alternatives, it is often necessary to work with different values or estimates that are still important.
S. V. Razumnikov
doaj   +1 more source

Enhancement of groundwater resources quality prediction by machine learning models on the basis of an improved DRASTIC method

open access: yesScientific Reports
Determining situation of groundwater vulnerability plays a crucial role in studying the groundwater resource management. Generally, the preparation of reliable groundwater vulnerability maps provides targeted and practical scientific measures for the ...
Ali Bakhtiarizadeh   +2 more
doaj   +1 more source

IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges

open access: yesIEEE Access, 2020
Over the last few decades, sustainable computing has been widely used in areas like social computing, artificial intelligence-based agent systems, mobile computing, and Internet of Things (IoT).
Pooja Anand   +5 more
doaj   +1 more source

Stressful Events Reported by Childhood Cancer Survivors and Community Controls From the St. Jude Lifetime (SJLIFE) Cohort: A Mixed Method Study

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Characterizing stressful events reported by childhood cancer survivors experienced throughout the lifespan may help improve trauma‐informed care relevant to the survivor experience. Methods Participants included 2552 survivors (54% female; 34 years of age) and 469 community controls (62% female; 33 years of age) from the St.
Megan E. Ware   +13 more
wiley   +1 more source

Home - About - Disclaimer - Privacy