Now showing items 1-10 of 105
Tails in the cloud: a survey and taxonomy of straggler management within large-scale cloud data centres
(Springer Verlag, 2020-03-12)
An innovative two-stage data compression scheme using adaptive block merging technique
(Elsevier BV, 2020-03-26)
Test data has increased enormously owing to the rising on-chip complexity of integrated circuits. It further increases the test data transportation time and tester memory. The non-correlated test bits increase the issue ...
ThermoSim: Deep Learning based Framework for Modeling and Simulation of Thermal-aware Resource Management for Cloud Computing Environments
(Elsevier BV, 2020-04)
Current cloud computing frameworks host millions of physical servers that utilize cloud computing resources in the form of different virtual machines. Cloud Data Center (CDC) infrastructures require significant amounts of ...
Measuring the maturity of Indian small and medium enterprises for unofficial readiness for capability maturity model integration-based software process improvement
Establishing the maturity levels of ‐ Small and Medium Enterprises (SMEs) without Capability Maturity Model Integration (CMMI) certification has always been regarded as an extremely challenging task. Software process ...
RGIM: An Integrated Approach to Improve QoS in AODV, DSR and DSDV Routing Protocols for FANETS Using the Chain Mobility Model
(Oxford University Press (OUP), 2020-04-30)
Flying ad hoc networks (FANETs) are a collection of unmanned aerial vehicles that communicate without any predefined infrastructure. FANET, being one of the most researched topics nowadays, finds its scope in many complex ...
IoT and Fog Computing based Predictive Maintenance Model for Effective Asset Management in Industry 4.0 using Machine Learning
The assets in Industry 4.0 are categorised into physical, virtual and human. The innovation and popularisation of ubiquitous computing enhance the usage of smart devices: RFID tags, QR codes, LoRa tags, etc. for assets ...
BioSec: A Biometric Authentication Framework for Secure and Private Communication among Edge Devices in IoT and Industry 4.0
With the rapid increase in the usage areas of Internet of Things (IoT) devices, it brings challenges such as security and privacy. One way to ensure these in IoT-based systems is user authentication. Until today, user ...
TRACTOR: Traffic‐aware and power‐efficient virtual machine placement in edge‐cloud data centers using artificial bee colony optimization
Technology providers heavily exploit the usage of edge‐cloud data centers (ECDCs) to meet user demand while the ECDCs are large energy consumers. Concerning the decrease of the energy expenditure of ECDCs, task placement ...