Zobrazeno 1 - 10
of 105
pro vyhledávání: '"Mohammad Masdari"'
Publikováno v:
IEEE Access, Vol 12, Pp 50489-50503 (2024)
The Internet provides a platform for sharing services, and web service brokers help users to choose the suitable service among similar services based on ranking. The quality of service is important in evaluating the services the user needs. However,
Externí odkaz:
https://doaj.org/article/8d9ab7cce3d14034ac09cc9461102dbc
Publikováno v:
International Journal of Industrial Electronics, Control and Optimization, Vol 5, Iss 4, Pp 286-296 (2022)
Software-defined networking is a new network model proposed to solve the complexity of traditional network problems and facilitate dynamic network operation and management. The separation of the control plane from the data plane is the main idea of s
Externí odkaz:
https://doaj.org/article/86eea4cf8d1946f9be8468c4178d89e9
Publikováno v:
Journal of Advances in Computer Engineering and Technology, Vol 7, Iss 1, Pp 81-92 (2021)
In recent years, social networks' growth has led to an increase in these networks' content. Therefore, text mining methods became important. As part of text mining, Sentiment analysis means finding the author's perspective on a particular topic. Soci
Externí odkaz:
https://doaj.org/article/886f80e266174e5fa8f3d0084463651c
An optimal VM Placement in Cloud Data Centers Based on Discrete Chaotic Whale Optimization Algorithm
Publikováno v:
Journal of Advances in Computer Engineering and Technology, Vol 6, Iss 4, Pp 201-212 (2020)
Cloud computing, with its immense potentials in low cost and on-demand services, is a promising computing platform for both commercial and non-commercial computation applications. It focuses on the sharing of information and computation in a large ne
Externí odkaz:
https://doaj.org/article/e90095a5ef544cc0895dc508975f06df
Autor:
Omed Hassan Ahmed, Joan Lu, Aram Mahmood Ahmed, Amir Masoud Rahmani, Mehdi Hosseinzadeh, Mohammad Masdari
Publikováno v:
IEEE Access, Vol 8, Pp 189404-189422 (2020)
Security attacks are a nightmare to many computing environments such as fog computing, and these attacks should be addressed. Fog computing environments are vulnerable to various kinds of DDoS attacks, which can keep fog resources busy. Typically in
Externí odkaz:
https://doaj.org/article/ce6de8880c95438d87af68ae4748918f
Publikováno v:
Big Data and Cognitive Computing, Vol 6, Iss 4, p 104 (2022)
The African Vulture Optimization Algorithm (AVOA) is inspired by African vultures’ feeding and orienting behaviors. It comprises powerful operators while maintaining the balance of exploration and efficiency in solving optimization problems. To be
Externí odkaz:
https://doaj.org/article/764112ec81c54ef8b7fa2f6f9449f1ba
Publikováno v:
Journal of Parallel and Distributed Computing. 175:1-21
Publikováno v:
Information Sciences. 626:315-338
Publikováno v:
Multimedia Tools and Applications. 82:13369-13399
Publikováno v:
Journal of Bionic Engineering. 20:81-104