3,386 results on '"Takizawa, Makoto"'
Search Results
152. A Comparison Study of UNDX and UNDX-m Methods for LDVM and RDVM Router Replacement Methods by WMN-PSODGA Hybrid Intelligent System Considering Stadium Distribution
153. Human-Centered Protocols for Secure Data Management in Distributed Systems
154. Transformative Computing for Distributed Services Management Protocols
155. A Fuzzy Based Simulation System for IoT Node Selection in an Opportunistic Network Considering IoT Node’s Unique Encounters as a New Parameter
156. Effect of Task Accomplishment for Actor Node Selection in WSANs: Performance Evaluation and a Comparison Study
157. Distributed Approach to Fog Computing with Auction Method
158. Performance Evaluation of WMNs Using WMN-PSOHC-DGA Considering LDVM and RDVM Replacement Methods
159. Mobile Fog Computing Model of a Topic-Based Publish/Subscribe System
160. The Power Consumption Model of a Server to Perform Data Access Application Processes in Virtual Machine Environments
161. A Comparison Study of Constriction and Random Inertia Weight Router Replacement Methods for WMNs Using WMN-PSODGA Hybrid Intelligent System
162. A Model for Mobile Fog Computing in the IoT
163. Fault Detection of Process Replicas on Reliable Servers
164. Evaluation of Data and Subprocess Transmission Strategies in the Tree-Based Fog Computing Model
165. Evaluation of an OI (Operation Interruption) Protocol to Prevent Illegal Information Flow in the IoT
166. An Energy-Efficient Process Replication Algorithm with Multi-threads Allocation
167. User Oriented Protocols for Data Sharing and Services Management
168. Efficient Information Flow Control by Reducing Meaningless Messages in P2PPSO Systems
169. Performance Analysis of WMNs by WMN-PSODGA Simulation System Considering Weibull and Chi-square Client Distributions
170. Centrality Based Geocasting for Opportunistic Networks
171. Selection of IoT Devices in Opportunistic Networks: A Fuzzy-Based Approach Considering IoT Device’s Selfish Behaviour
172. A Fuzzy-Based System for Actor Node Selection in WSANs Considering Level of Received Signal
173. The Improved Energy-Efficient Quorum Selection with Excluding Meaningless Methods
174. Biometric-Based Linguistic Solutions for Data Encryption and Sharing
175. Energy-Efficient Group Migration of Virtual Machines in a Cluster
176. Energy-Efficient Recovery Algorithm in the Fault-Tolerant Tree-Based Fog Computing (FTBFC) Model
177. Capability token selection algorithms to implement lightweight protocols
178. Hidden-charm and bottom meson-baryon molecules coupled with five-quark states
179. The Redundant Active Time-Based Algorithm with Forcing Meaningless Replica to Terminate
180. Performance Evaluation of WMNs by WMN-PSOSA-DGA Hybrid Simulation System Considering Stadium Distribution of Mesh Clients and Different Number of Mesh Routers
181. Performance Evaluation of RIWM and LDVM Router Replacement Methods for WMNs by WMN-PSOSA-DGA Considering Chi-Square Distribution
182. The Improved Redundant Active Time-Based (IRATB) Algorithm for Process Replication
183. Design and Implementation of the TBOI (Time-Based Operation Interruption) Protocol to Prevent Late Information Flow in the IoT
184. Human Centered Protocols in Transformative Computing
185. An Algorithm to Select an Energy-Efficient Server for an Application Process in a Cluster
186. Performance Comparison of Constriction and Linearly Decreasing Inertia Weight Router Replacement Methods for WMNs by WMN-PSOSA-DGA Hybrid Simulation System Considering Chi-Square Distribution of Mesh Clients
187. Design and Implementing of the Dynamic Tree-Based Fog Computing (DTBFC) Model to Realize the Energy-Efficient IoT
188. An Energy-Efficient Migration Algorithm for Virtual Machines to Reduce the Number of Migrations
189. Effect of Slice Overloading Cost on Admission Control for 5G Wireless Networks: A Fuzzy-Based System and Its Performance Evaluation
190. A Hybrid Intelligent Simulation System for Node Placement in WMNs Considering Chi-Square Distribution of Mesh Clients and Different Router Replacement Methods
191. Realistic Topic-Based Data Transmission Protocol in a Mobile Fog Computing Model
192. Resource Management in SDN-VANETs Using Fuzzy Logic: Effect of Average Processing Capability per Neighbor Vehicle on Management of Cloud-Fog-Edge Resources
193. Implementation of a Device Adopting the OI (Operation Interruption) Protocol to Prevent Illegal Information Flow in the IoT
194. Effect of Vehicle Technical Condition on Real-Time Driving Risk Management in VANETs
195. The Improved Active Time-Based (IATB) Algorithm with Multi-threads Allocation
196. A Secure Group Communication (SGC) Protocol for a P2P Group of Peers Using Blockchain
197. A Decision-Making System Based on Fuzzy Logic for IoT Node Selection in Opportunistic Networks Considering Node Betweenness Centrality as a New Parameter
198. An Integrated Fuzzy-Based Simulation System for Driving Risk Management in VANETs Considering Road Condition as a New Parameter
199. Performance Evaluation of WMNs by WMN-PSODGA Simulation System Considering Exponential Distribution of Mesh Clients and Different Router Replacement Methods
200. An Algorithm to Select an Energy-Efficient Sever for an Application Process in a Cluster of Servers
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.