|
|
|
Sotirios Kontogiannis, Myrto Konstantinidou, Vasileios Tsioukas and Christos Pikridas
In viticulture, downy mildew is one of the most common diseases that, if not adequately treated, can diminish production yield. However, the uncontrolled use of pesticides to alleviate its occurrence can pose significant risks for farmers, consumers, and...
ver más
|
|
|
|
|
|
|
Tomasz Rak
This study aims to identify the most effective input parameters for performance modelling of container-based web systems. We introduce a method using queueing Petri nets to model web system performance for containerized structures, leveraging prior measu...
ver más
|
|
|
|
|
|
|
Konstantinos Filippou, George Aifantis, George A. Papakostas and George E. Tsekouras
In this paper, we built an automated machine learning (AutoML) pipeline for structure-based learning and hyperparameter optimization purposes. The pipeline consists of three main automated stages. The first carries out the collection and preprocessing of...
ver más
|
|
|
|
|
|
|
Byoung Soo Kim, Sang Hyeop Lee, Ye Rim Lee, Yong Hyun Park and Jongpil Jeong
Manufacturers are expanding their business-process innovation and customized manufacturing to reduce their information technology costs and increase their operational efficiency. Large companies are building enterprise-wide hybrid cloud platforms to furt...
ver más
|
|
|
|
|
|
|
Ferry Astika Saputra, Muhammad Salman, Jauari Akhmad Nur Hasim, Isbat Uzzin Nadhori and Kalamullah Ramli
Snort is a well-known, signature-based network intrusion detection system (NIDS). The Snort sensor must be placed within the same physical network, and the defense centers in the typical NIDS architecture offer limited network coverage, especially for re...
ver más
|
|
|
|
|
|
|
Tamas Pflanzner, Hamza Baniata and Attila Kertesz
Several revolutionary applications have been built on the distributed ledgers of blockchain (BC) technology. Besides cryptocurrencies, many other application fields can be found in smart systems exploiting smart contracts and Self Sovereign Identity (SSI...
ver más
|
|
|
|
|
|
|
Jin-young Choi, Minkyoung Cho and Jik-Soo Kim
Recently, ?Big Data? platform technologies have become crucial for distributed processing of diverse unstructured or semi-structured data as the amount of data generated increases rapidly. In order to effectively manage these Big Data, Cloud Computing ha...
ver más
|
|
|
|
|
|
|
Dongmin Kim, Hanif Muhammad, Eunsam Kim, Sumi Helal and Choonhwa Lee
Kubernetes, a container orchestration tool for automatically installing and managing Docker containers, has recently begun to support a federation function of multiple Docker container clusters. This technology, called Kubernetes Federation, allows devel...
ver más
|
|
|
|
|
|
|
Richard P. Signell and Dharhas Pothina
The traditional flow of coastal ocean model data is from High-Performance Computing (HPC) centers to the local desktop, or to a file server where just the needed data can be extracted via services such as OPeNDAP. Analysis and visualization are then cond...
ver más
|
|
|
|