Results 11 to 20 of about 23,723 (266)
UNCERTAINTY HANDLING IN DISASTER MANAGEMENT USING HIERARCHICAL ROUGH SET GRANULATION [PDF]
Uncertainty is one of the main concerns in geospatial data analysis. It affects different parts of decision making based on such data. In this paper, a new methodology to handle uncertainty for multi-criteria decision making problems is proposed.
H. Sheikhian, M. R. Delavar, A. Stein
doaj +1 more source
Will Zero Vulnerability Computing (ZVC) Ever Be Possible? Testing the Hypothesis
Life without computers is unimaginable. However, computers remain vulnerable to cybercrimes, a USD 6 trillion industry that the world has come to accept as a “necessary evil”.
Fazal Raheman +3 more
doaj +1 more source
ERMOCTAVE: A Risk Management Framework for IT Systems Which Adopt Cloud Computing
Many companies are adapting cloud computing technology because moving to the cloud has an array of benefits. During decision-making, having processed for adopting cloud computing, the importance of risk management is progressively recognized.
Masky Mackita +2 more
doaj +1 more source
A novel fault-tolerant scheduling approach for collaborative workflows in an edge-IoT environment
As a newly emerging computing paradigm, edge computing shows great capability in supporting and boosting 5G and Internet-of-Things (IoT) oriented applications, e.g., scientific workflows with low-latency, elastic, and on-demand provisioning of ...
Tingyan Long +8 more
doaj +1 more source
Revisiting Employment Vulnerability Index Using Principal Component Analysis
The share of workers in vulnerable employment is directly linked to the share of people living in poverty. The statement recalls why understanding the employment vulnerability index (EVI) of a nation based on the present situations is very relevant.
Glecil Joy Dalupo, Gary Garcia
doaj +1 more source
Coverage-oriented and target-oriented fuzzing are widely used in vulnerability detection. Compared with coverage-oriented fuzzing, target-oriented fuzzing concentrates more computing resources on suspected vulnerable points to improve the testing ...
Chen Chen, Han Xu, Baojiang Cui
doaj +1 more source
Objective. In decision making when comparing alternatives, it is often necessary to work with different values or estimates that are still important.
S. V. Razumnikov
doaj +1 more source
Determining situation of groundwater vulnerability plays a crucial role in studying the groundwater resource management. Generally, the preparation of reliable groundwater vulnerability maps provides targeted and practical scientific measures for the ...
Ali Bakhtiarizadeh +2 more
doaj +1 more source
Over the last few decades, sustainable computing has been widely used in areas like social computing, artificial intelligence-based agent systems, mobile computing, and Internet of Things (IoT).
Pooja Anand +5 more
doaj +1 more source
ABSTRACT Introduction Characterizing stressful events reported by childhood cancer survivors experienced throughout the lifespan may help improve trauma‐informed care relevant to the survivor experience. Methods Participants included 2552 survivors (54% female; 34 years of age) and 469 community controls (62% female; 33 years of age) from the St.
Megan E. Ware +13 more
wiley +1 more source

