2011
DOI: 10.37652/juaps.2011.44313
|View full text |Cite
|
Sign up to set email alerts
|

Effects of Parallel Processing Implementation on Balanced Load-Division Depending on Distributed Memory Systems

Abstract: Complex problems need long time to be solved, with low efficiency and performance. Therefore, to overcome these drawbacks, the studies went toward the approaches of breaking the problem into independent parts, and treating each part individually in the way that each processing element can execute its part of the problem simultaneously with the others.Parallel processors are computer systems that consist of multiple processing units connected via some interconnection network and the software needed to make the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 2 publications
(3 reference statements)
0
2
0
Order By: Relevance
“…However, each year sees the creation of hundreds of brand-new phishing websites, many of which make an effort to pose as trustworthy businesses such as banks, file-hosting providers, and government institutions. Phishing is a form of online fraud in which an individual attempts to obtain sensitive information by impersonating a legitimate business [56]. Phishing is a kind of internet fraud in which a person tries to get sensitive information by impersonating a real company in order to trick their target into providing the information.…”
Section: Background Theorymentioning
confidence: 99%
“…However, each year sees the creation of hundreds of brand-new phishing websites, many of which make an effort to pose as trustworthy businesses such as banks, file-hosting providers, and government institutions. Phishing is a form of online fraud in which an individual attempts to obtain sensitive information by impersonating a legitimate business [56]. Phishing is a kind of internet fraud in which a person tries to get sensitive information by impersonating a real company in order to trick their target into providing the information.…”
Section: Background Theorymentioning
confidence: 99%
“…For representation documents, the standard text cluster model uses bags of words (BOW) [59,60]. Sadly, the crucial drawback of this model is that it lacks semantic relationships between the wordings.…”
Section: A Document Clustering Based On Traditional Waymentioning
confidence: 99%
“…The whole population of the globe is expected to be surrounded by a network of Internet of Things (IoT) devices and intelligent power grids by the year 2025, according to our projections. Internet of Things (IoT) encompasses a wide range of issues, including but not limited to: security problems, difficulty in data management as a consequence of enormous volumes of data, restricted network capacity, a high necessity for bandwidth, and health concerns [8]. Taking into consideration the manner in which these conceptual concepts are actually put into practice is very necessary in order to conduct an accurate assessment of the influence that these ideas have on the day-to-day lives of the people who live there.…”
Section: [144]mentioning
confidence: 99%
“…[145] a. Application of IoT In the realm of the Internet of Things, there is a wide range of applications that may be classified as belonging to the umbrella [8]. Retail management, healthcare systems, transportation systems, human activities, smartwatches, and smart wristbands are some examples of the applications that fall under this category.…”
Section: Internet Of Things (Iot) and The Smart Citiesmentioning
confidence: 99%