Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Mohammad Mehdi GILANIAN SADEGHI"'
Publikováno v:
Complexity, Vol 2023 (2023)
In the fog computing paradigm, if the computing resources of an end device are insufficient, the user’s tasks can be offloaded to nearby devices or the central cloud. In addition, due to the limited energy of mobile devices, optimal offloading is c
Externí odkaz:
https://doaj.org/article/2f30a16276624b2abe38f4ff0dca0b23
Autor:
Mona NAGHDEHFOROUSHHA, Mehdi DEHGHAN TAKHT FOOLADI, MOHAMMED HOSSEIN REZVANI, Mohammad Mehdi GILANIAN SADEGHI
Publikováno v:
Turkish Journal of Electrical Engineering and Computer Sciences. 31:193-215
Autor:
MONA NAGHDEHFOROUSHHA, MEHDI DEHGHAN TAKHT FOOLADI, MOHAMMAD HOSSEIN REZVANI, MOHAMMAD MEHDI GILANIAN SADEGHI
Publikováno v:
Turkish Journal of Electrical Engineering and Computer Sciences. 30:1419-1438
Autor:
Mohammad Hassan Khoobkar, Mehdi Dehghan Takht Fooladi, Mohammad Hossein Rezvani, Mohammad Mehdi Gilanian Sadeghi
Publikováno v:
Expert Systems with Applications. 216:119417
Publikováno v:
Advanced Powder Technology. 30:1823-1834
In this study, mesoporous SBA-15 was functionalized by dithiooxamide ligand through sodium dodecyl sulfate as intermediate. The obtained nanocomposite was considered as a strong adsorbent towards selective removal of the cobalt (II) ions from the ind
Publikováno v:
Journal of Inorganic and Organometallic Polymers and Materials. 29:1383-1389
Towards investigation on the application of metallofullerene in the removal of mustard gas, a fullerene C20 has been considered for substitutional doping by three of transition metals (Ti, Fe, and Ni). The resulted metallofullerenes (C19Ti, C19Fe, an
Publikováno v:
Journal of Grid Computing. 19
In a fog-cloud environment, the tasks submitted by end-users are first sent to intermediate nodes called fog nodes. If the computing resources in fog nodes are insufficient, the nodes will offload tasks to the remote cloud. Naturally, intermediate no
Publikováno v:
Synthetic Metals. 245:1-9
In the present study, the surface of the magnetic nanoparticles was modified by cetyltrimethylammonium bromide and polyaniline polymer. The modified nanocomposite was examined as a strong absorbent for the removal of lead ions (II) from the industria
Publikováno v:
Wireless Personal Communications. 92:727-748
In Mobile WiMAX, a Base Station (BS) delivers security keys to Mobile Stations (MSs) through a key distribution scheme to guarantee security and access control. The MSs need to perform ciphering operations to access the keys upon rekeying process. In
Publikováno v:
International Journal of Communication Systems. 27:2166-2189
SUMMARY Efficiency and security are two critical but often conflicting issues in Multicast and Broadcast Service of IEEE 802.16e technology. Hence, it is vital to ensure an optimal scenario where neither security concerns, nor operational efficiency