Intrusion Detection systems (IDS) play a crucial role in a comprehensive security framework for an organization by detection and response to security incidents, encompassing both network-based and host-based threats. ...
详细信息
Withthe increasingly fierce competition in the automobile industry, the demand for digital transformation is increasingly strong, and the requirements for system operation and maintenance are also increasingly high. ...
详细信息
In recent years, there has been a growing interest in cloud computing as a means to enhance user access to shared computing resources, including software and hardware, through the internet. However, the efficient util...
In recent years, there has been a growing interest in cloud computing as a means to enhance user access to shared computing resources, including software and hardware, through the internet. However, the efficient utilization of these cloud resources has been a challenge, often resulting in wastage or degraded service performance due to inadequate scheduling. To overcome this challenge, numerous researchers have focused on improving existing Priority Rule (PR) cloud schedulers by developing dynamic scheduling algorithms, but they have fallen short of meeting user satisfaction. In this study, we introduce a new PR scheduler called Priority Based Fair Scheduling (PBFS), which takes into account key parameters such as CPU Time, Job Arrival Time, and Job Length. We evaluate the performance of PBFS by comparing it with five existing algorithms, and the results demonstrate that PBFS surpasses the performance of the other algorithms. the experiment was conducted using the CloudSim simulator, utilizing a dataset of 300 and 400 jobs. In order to assess the performance, three key metrics were employed: flow time, makespan time, and total tardiness. these metrics were chosen to evaluate and analyze the effectiveness of the proposed scheduling algorithm.
作者:
Siddhardha, M.Jagadeesh, P.Saveetha University
Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences Department of Electronics and Communication Engineering Tamilnadu Chennai602105 India
Aim: this study presents an efficient implementation of the Novel Data Encryption Standard (DES) algorithm with an improved key generation method and the result is compared withthe Viterbi decoder algorithm. Material...
详细信息
作者:
Perlis, Alan J.Yale Univ
Dep of Computer Science New Haven CT USA Yale Univ Dep of Computer Science New Haven CT USA
To understand software we must go beyond the techniques and methodologies we have so carefully and painfully crafted, e. g. , high level languages, structured programming, data structures and types, semaphores, functi...
详细信息
ISBN:
(纸本)0818606207
To understand software we must go beyond the techniques and methodologies we have so carefully and painfully crafted, e. g. , high level languages, structured programming, data structures and types, semaphores, functional programming, etc. the author believes that the word 'software' obscures the issues that dominate our concerns and he chooses the word 'organithm' to identify that class of programs we study in softwareengineering. the major issue of softwareengineering environments is not how to ease our task of programming systems but how to accelerate the rate at which improvement in internal function can be obtained without unduly jeapordizing the external functions of an organithm and with maximizing the use of organithms to perform reorganization.
Withthe application of IT in the field of electric power system, computer aided electric power system design and analysis software has played an important role in electric power system research and teaching. Withthe...
详细信息
software testing is a method for finding bugs in programs for a long time. software model checking is a better alternative of software testing that does not only find bugs in the software but also proves absence of bu...
详细信息
Geography location and object report is a key aspect in field survey, nevertheless of the spatial level. this research shown the request of land survey by using no code software. the study process collects data in the...
详细信息
the proceedings contain 52 papers. the topics discussed include: model driven development for distributed real-time and embedded systems;activity diagram patterns for modeling quality constraints in business processes...
详细信息
ISBN:
(纸本)3540290109
the proceedings contain 52 papers. the topics discussed include: model driven development for distributed real-time and embedded systems;activity diagram patterns for modeling quality constraints in business processes;code generation from UML models with semantic variation points;composing domain-specific languages for wide-scope softwareengineering applications;model typing for improving reuse in model-driven engineering;computing refactorings of behavior models;dynamic secure aspect modeling with UML: from models to code;domain models are aspect free;properties of stereotypes from the perspective of their role in designs;and a modeling and simulation based approach to dependable system design.
A programming tool is described for real-time embedded systems implemented by multiple tasks. the tool, called TRUE, performs the allocation of tasks by transformation of the program the user has written. TRUE reads t...
详细信息
ISBN:
(纸本)0818606207
A programming tool is described for real-time embedded systems implemented by multiple tasks. the tool, called TRUE, performs the allocation of tasks by transformation of the program the user has written. TRUE reads the program and the requirements about its response time. TRUE transforms the program applying rules based on the requirements. then the program is translated into a code for operating system I-TRON. I-TRON is the original real-time operating system for 32-bit microprocessors. A description is given of the implementation of TRUE and an example of its use is presented.
暂无评论