[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 25, Issue 32022
Publisher:
  • Inderscience Publishers
  • World Trade Center Bldg, 29, route de Pre-Bois, Case Postale 896
  • Geneva 15
  • Switzerland
ISSN:1742-7185
EISSN:1742-7193
Reflects downloads up to 19 Dec 2024Bibliometrics
Skip Table Of Content Section
research-article
Empowerment of cluster and grid load balancing algorithms to support distributed exascale computing systems with high compatibility

The nature of the scientific applications that need to be distributed exascale systems is in a way that both traditional and distributed exascale systems programs are required. As a result, the load balancer not only supports traditional mechanisms of the ...

research-article
An improved method for k-means clustering based on internal validity indexes and inter-cluster variance

It is difficult to get the best cluster number of k-means clustering algorithm by using the traditional internal validity indexes. Therefore, a good clustering result cannot be obtained usually. To solve this problem, this paper proposes an improved ...

research-article
Human interactive behaviour recognition method based on multi-feature fusion

Recently, the selection of the overall and individual characteristics in interactive actions and the high-dimensional complexity of features are still important factors affecting the recognition accuracy. In this paper, we propose a human interactive ...

research-article
Optimised implementation of AVR system using particle swarm optimisation

Several techniques have been developed to improve the control quality and deliver optimised products in many industrial process domains. This work aims to propose an optimised automatic voltage regulator (AVR) system implementation by applying a nature-...

research-article
A secure hash function based on sponge construction and chaos-maps

This work introduces a new hash function based on the sponge structure and two chaotic maps. It aims to avoid the major problems of Merkle-Damgård construction and ad hoc structures such as multi-collision and length extension attacks. The proposed hash ...

research-article
A multi-objective computation offloading algorithm in MEC environments

Mobile edge computing (MEC) is able to provide cloud computing capabilities at network edges by offloading computation tasks to MEC servers deployed in proximity of edge nodes. Therefore, how to make offloading decision for mobile users has become a ...

research-article
An improved motion estimation criterion for temporal coding of video

The size of video data is growing exponentially worldwide and hence there is a need for better video coding standards. MPEG and H.26X have provided several standards for video coding. The latest and effective video coding standards are AVC, HEVC, and AV1. ...

research-article
Cyberbullying detection: an ensemble learning approach

Online social networking platforms have become a common choice for people to communicate with friends, relatives, or business partners. This allows sharing life achievement, success, and much more. In parallel, it also invited hidden issues such as web-...

research-article
T-PdM: a tripartite predictive maintenance framework using machine learning algorithms

The purpose of this paper is to propose new predictive maintenance (PdM) framework that has three aims: 1) estimating the remaining useful life (RUL) of a machine; 2) classifying machine health status (failure/non-failure); 3) discovering the relationship ...

research-article
Automated network intrusion detection using multimodal networks

Intrusion detection requires accurate and timely detection of any bad connection that intends to exploit network vulnerabilities. Previous approaches have focused on deriving statistical features based on domain knowledge, followed by primitive machine ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.