Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Failure Prediction for Scientific Workflows Using Nature-Inspired Machine Learning Approach

    S. Sridevi*, Jeevaa Katiravan

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 223-233, 2023, DOI:10.32604/iasc.2023.031928

    Abstract Scientific workflows have gained the emerging attention in sophisticated large-scale scientific problem-solving environments. The pay-per-use model of cloud, its scalability and dynamic deployment enables it suited for executing scientific workflow applications. Since the cloud is not a utopian environment, failures are inevitable that may result in experiencing fluctuations in the delivered performance. Though a single task failure occurs in workflow based applications, due to its task dependency nature, the reliability of the overall system will be affected drastically. Hence rather than reactive fault-tolerant approaches, proactive measures are vital in scientific workflows. This work puts forth an attempt to concentrate on… More >

  • Open Access

    ARTICLE

    An Optimal Algorithm for Secure Transactions in Bitcoin Based on Blockchain

    Jazem Mutared Alanazi, Ahmad Ali AlZubi*

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3693-3712, 2023, DOI:10.32604/iasc.2023.030287

    Abstract Technological advancement has made a significant contribution to the change of the economy and the advancement of humanity. Because it is changing how economic transactions are carried out, the blockchain is one of the technical developments that has a lot of promise for this progress. The public record of the Bitcoin blockchain provides dispersed users with evidence of transaction ownership by publishing all transaction data from block reward transactions to unspent transaction outputs. Attacks on the public ledger, on the other hand, are a result of the fact that all transaction information are exposed. De-anonymization attacks allow users to link… More >

Displaying 1-10 on page 1 of 2. Per Page