書(shū)目名稱Green, Pervasive, and Cloud Computing影響因子(影響力)學(xué)科排名
書(shū)目名稱Green, Pervasive, and Cloud Computing網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Green, Pervasive, and Cloud Computing網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Green, Pervasive, and Cloud Computing被引頻次
書(shū)目名稱Green, Pervasive, and Cloud Computing被引頻次學(xué)科排名
書(shū)目名稱Green, Pervasive, and Cloud Computing年度引用
書(shū)目名稱Green, Pervasive, and Cloud Computing年度引用學(xué)科排名
書(shū)目名稱Green, Pervasive, and Cloud Computing讀者反饋
書(shū)目名稱Green, Pervasive, and Cloud Computing讀者反饋學(xué)科排名
作者: 朦朧 時(shí)間: 2025-3-21 22:38
https://doi.org/10.1007/978-1-84628-582-0indings revealed a set of twenty-one recommendations to take into account when implementing cloud computing in the government sector, such as using a pilot project, training, and consulting, among others. These recommendations are useful to guide the IT decision makers in the process of cloud comput作者: Chameleon 時(shí)間: 2025-3-22 03:38 作者: UTTER 時(shí)間: 2025-3-22 05:04
Diseases and Abnormalities of the Secundinestrong isolation and container-level management for network resource with joint consideration of container characteristics and quality of service. To simplify the traffic control, we also design a series of APIs which allow inexpert programmers to perform complicated traffic control on each container作者: 偏狂癥 時(shí)間: 2025-3-22 11:08
Laboratory Assessment During Pregnancy,e broadcast efficiency and meanwhile retain the security. BlockP2P first operates the geographical proximity sensing clustering, which leverages K-Means algorithm for gathering proximity peer nodes into clusters. It follows by the hierarchical topological structure that ensures strong connectivity a作者: 全能 時(shí)間: 2025-3-22 13:27 作者: 全能 時(shí)間: 2025-3-22 19:38 作者: Tidious 時(shí)間: 2025-3-23 00:37
Dynamic Resource Allocation in Hybrid Mobile Cloud Computing for Data-Intensive Applications demonstrate the ability of the proposed technique to generate an adaptive resource allocation in response to the variation on application data size and network bandwidth. Results reveal that the proposed technique improves the execution time for data-intensive applications by an average of 78% and 作者: 惹人反感 時(shí)間: 2025-3-23 02:28
CNTC: A Container Aware Network Traffic Control Frameworktrong isolation and container-level management for network resource with joint consideration of container characteristics and quality of service. To simplify the traffic control, we also design a series of APIs which allow inexpert programmers to perform complicated traffic control on each container作者: 機(jī)械 時(shí)間: 2025-3-23 08:33
BlockP2P: Enabling Fast Blockchain Broadcast with Scalable Peer-to-Peer Network Topologye broadcast efficiency and meanwhile retain the security. BlockP2P first operates the geographical proximity sensing clustering, which leverages K-Means algorithm for gathering proximity peer nodes into clusters. It follows by the hierarchical topological structure that ensures strong connectivity a作者: 變態(tài) 時(shí)間: 2025-3-23 10:42
Fistula Surgeons in the Modern Era,lytic hierarchy process (AHP) method. A Software Defined Networking (SDN) approach is devised in order to reroute offloading data. Face recognition application were evaluated and achieved gains in terms of reduced processing times of up to 58,58%.作者: Mutter 時(shí)間: 2025-3-23 16:21 作者: 脫落 時(shí)間: 2025-3-23 22:06 作者: 信徒 時(shí)間: 2025-3-24 01:13 作者: Insulin 時(shí)間: 2025-3-24 04:12
https://doi.org/10.1007/978-3-7091-5365-9 extension for distributed processing. The stack of proposed methods was evaluated using a cluster with commodity hardware and a big data of solar energy time series, achieving good performance in feasible processing time.作者: maculated 時(shí)間: 2025-3-24 07:16 作者: Lipoma 時(shí)間: 2025-3-24 11:04
Zerrin Ozkose Satirlar,Gozde Inan paper presents a straightforward background on basic hash-based signatures, an implementation of hash-based signatures schemes, specifically Winternitz and Merkle Signature Scheme, on an Arduino Due platform, and a performance evaluation. Our results show that hash-based signatures are feasible for IoT-like devices.作者: ineluctable 時(shí)間: 2025-3-24 18:36
Linear IgM Dermatosis of Pregnancy,nce of actions. On the end-user side, PlatoS captures the user interaction with the mockups and performs the automatic identification of usability problems on the base of the log data. An example of evaluation of an eCommerce mobile prototypes is also presented.作者: 的是兄弟 時(shí)間: 2025-3-24 20:33 作者: Tortuous 時(shí)間: 2025-3-25 01:19
Autonomic IoT Battery Management with Fog Computingm is also developed with a website, that displays the sensor values, and the estimated battery life of the IoT device. Calculations were done with a variation of sleep-time of the IoT device, the results shows an increase of 2.5 times of battery lifespan.作者: 系列 時(shí)間: 2025-3-25 03:56 作者: Bernstein-test 時(shí)間: 2025-3-25 11:15
Automating Mockup-Based Usability Testing on the Mobile Devicence of actions. On the end-user side, PlatoS captures the user interaction with the mockups and performs the automatic identification of usability problems on the base of the log data. An example of evaluation of an eCommerce mobile prototypes is also presented.作者: 笨拙的我 時(shí)間: 2025-3-25 15:18 作者: pus840 時(shí)間: 2025-3-25 16:59 作者: CRATE 時(shí)間: 2025-3-25 23:05 作者: Airtight 時(shí)間: 2025-3-26 01:23 作者: RODE 時(shí)間: 2025-3-26 08:05
Diabetic Ketoacidosis and Pregnancys of the LoRa transmission. The results obtained shows the system may achieve reasonable performance in terms of packet error rate and message throughput. The system showed LoRa is a viable technology to be applied in this context and other applications of Intelligent Transport Systems.作者: 得體 時(shí)間: 2025-3-26 11:18
Integration of Data Mining Classification Techniques and Ensemble Learning for Predicting the Type ofective and accurate decision making. In this paper, various classifiers have been tested for the prediction of type of breast cancer recurrence and the results show that neural networks outperform others.作者: 漸強(qiáng) 時(shí)間: 2025-3-26 13:43
RETRACTED CHAPTER: U-Control Chart Based Differential Evolution Clustering for Determining the Numbeoposed method was tested using six public datasets from the UCI repository about academic efficiency (AE) and evaluated with Davies Bouldin Index (DBI) and Cosine Similarity (CS) measure. The results show that the proposed method yields excellent performance compared to prior researches.作者: 絆住 時(shí)間: 2025-3-26 18:58
Mobility Aware RPL (MARPL): Mobility to RPL on Neighbor Variability presented in this paper. MARPL provides a mobility detection mechanism based on neighbor variability. Performance evaluation results obtained by the Cooja Simulator confirm the effectiveness of MARPL regarding DODAG Disconnection prevention, Packet Delivery Rate, Packet Delivery Delay and Overhead when compared to other protocols.作者: dapper 時(shí)間: 2025-3-26 23:29
A Method Based on Dispersion Analysis for Data Reduction in WSNurements whose values present low dispersion. Simulations were carried out in the Castalia Simulator and the results were promising in reducing data transmissions while maintaining data accuracy and low energy consumption.作者: 一小塊 時(shí)間: 2025-3-27 04:47 作者: 果仁 時(shí)間: 2025-3-27 07:26
Green, Pervasive, and Cloud Computing978-3-030-19223-5Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Anticlimax 時(shí)間: 2025-3-27 12:50 作者: Irritate 時(shí)間: 2025-3-27 16:04
Integration of Data Mining Classification Techniques and Ensemble Learning for Predicting the Type otes. Data mining facilitates to manage the data and provide the useful medical progression and treatment of cancerous conditions as these methods can help to reduce the number of false positive and false negative decisions. Various machine learning techniques can be used to support the doctors in ef作者: characteristic 時(shí)間: 2025-3-27 18:33 作者: 哺乳動(dòng)物 時(shí)間: 2025-3-28 00:16 作者: 褲子 時(shí)間: 2025-3-28 05:03
Mobility Aware RPL (MARPL): Mobility to RPL on Neighbor Variabilityuting protocol. The IPv6 Routing Protocol for Low-Power and Lossy Network (RPL) is considered to be a possible standard routing protocol for LLNs. However, RPL was developed for static networks and node mobility decreases RPL overall performance. These are the aims of the Mobility Aware RPL (MARPL),作者: Biofeedback 時(shí)間: 2025-3-28 10:08 作者: arcane 時(shí)間: 2025-3-28 10:24
Autonomic IoT Battery Management with Fog Computingt. IoT allows new products and services to be applied in different areas, such as smart cities, industry, smart homes, environment monitoring, smart cars, heath monitoring and others. Fog computing emerges to meet the Quality of Service requirements, of low latency real time IoT systems, that Cloud 作者: obsolete 時(shí)間: 2025-3-28 16:48
Evaluating Post-quantum Signatures for IoT Deviceshm which will break them in polynomial time. Thus, cryptosystems resilient to quantum computing must be considered, especially for devices in the Internet of Things which limitations may hinder the use of secure cryptosystems. An alternative is the use of hash-based signatures which are post-quantum作者: Hay-Fever 時(shí)間: 2025-3-28 21:32 作者: 修飾 時(shí)間: 2025-3-28 23:46 作者: induct 時(shí)間: 2025-3-29 04:12
Network and Cloudlet Selection for Computation Offloading on a Software-Defined Edge Architectureoading. However, mobile user experience can still be affected due to signal degradation, reduced network throughput, as well as limited edge processing capabilities. To mitigate this problem, this paper proposes a framework to select computational and network resources for offloading operations in a作者: outer-ear 時(shí)間: 2025-3-29 07:41 作者: Limerick 時(shí)間: 2025-3-29 13:39 作者: epinephrine 時(shí)間: 2025-3-29 18:23
A Multi-device Cloud-Based Personal Event Management System retrieve and organize it in a secure way. LifeBook is a PIMS running on the mobile device which manages in secure way information concerning events captured by all the user’s devices. To this aim, we present the LifeBook Security Model to protect user data stored on the cloud. Events are classified作者: 繁榮中國(guó) 時(shí)間: 2025-3-29 21:48
CNTC: A Container Aware Network Traffic Control Frameworkent and reliable performance, cloud providers should ensure resource isolation since each host consists of multiple containers sharing the host kernel. As a mainstream container system, Docker uses CGroup?to provide CPU, memory, and disk resource isolation. Unfortunately, all present solutions ignor作者: Encumber 時(shí)間: 2025-3-30 00:07
BlockP2P: Enabling Fast Blockchain Broadcast with Scalable Peer-to-Peer Network Topologycations without any third parties. Existing blockchain systems have successfully either resolved the scalability issue by advancing the distributed consensus protocols from the control plane, or complemented the security issue by updating the block structure and encryption algorithms from the data p作者: BOOST 時(shí)間: 2025-3-30 04:23
Behavior Therapy with Obsessive-Compulsives,dictive performance. Moreover, this data comes in the form of a continuous and evolving stream imposing new constraints, e.g., limited memory and energy resources. In the same way, energy-aware ML algorithms are gaining relevance due to the power constraints of hardware platforms in several real-lif作者: Pelvic-Floor 時(shí)間: 2025-3-30 09:50 作者: lesion 時(shí)間: 2025-3-30 12:45
https://doi.org/10.1057/9781137547231owever, ACDE still makes use of the manual strategy to determine k activation threshold thereby affecting its performance. In this study, the ACDE problem will be ameliorated using the u-control chart (UCC) then the cluster number generated from ACDE will be fed to k-means. The performance of the pr作者: blight 時(shí)間: 2025-3-30 18:52
https://doi.org/10.1007/978-3-7091-5365-9 development of highly accurate machine learning models is yet harder when considering the optimization of hyper-parameters, an expensive computational task. To tame these challenges this work proposes the Weighted Multivariate Fuzzy Time Series method, a simple and non-parametric forecasting method作者: 誰(shuí)在削木頭 時(shí)間: 2025-3-30 21:46
https://doi.org/10.1007/978-3-030-26478-9uting protocol. The IPv6 Routing Protocol for Low-Power and Lossy Network (RPL) is considered to be a possible standard routing protocol for LLNs. However, RPL was developed for static networks and node mobility decreases RPL overall performance. These are the aims of the Mobility Aware RPL (MARPL),