2017 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications (ICRAMET) 2017
DOI: 10.1109/icramet.2017.8253146
|View full text |Cite
|
Sign up to set email alerts
|

Enhancement the video quality forwarding Using Receiver-Based Approach(URBA) in Vehicular Ad-Hoc Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
11
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…Reliability in Could due to repeated on-off cycles in a utility model is also considered as a benefit of the energy savings received by switching the unused PMs off. A utility function model [29] RACE has been presented which considers the MTTF, thermal effects on hardware, the cost of VM migration, and PM state. The system mitigates SLA violations based on the allocated capacity being less than the required capacity.…”
Section: Reliability Considerations For Optimal Cloud Computingmentioning
confidence: 99%
“…Reliability in Could due to repeated on-off cycles in a utility model is also considered as a benefit of the energy savings received by switching the unused PMs off. A utility function model [29] RACE has been presented which considers the MTTF, thermal effects on hardware, the cost of VM migration, and PM state. The system mitigates SLA violations based on the allocated capacity being less than the required capacity.…”
Section: Reliability Considerations For Optimal Cloud Computingmentioning
confidence: 99%
“…Data flow algorithms handle data continuous stream to store past records with only limited ability. Online machine learning covers methods that update their models after observing a new event and can instantly make predictions based on the updated model [11][12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…This method is helpful in medical field to recognize the identity of dead bodies [14][15][16][17][18]. Through this research we are going to prove the importance of this specific biometric, the ear authentication process in order to be used in other technological fields like in personal security process [19][20][21][22][23][24][25]. Ear structure is a distinctive organism of Man's body structure which has many different unique characteristics like form, skin, pose, and others [26][27][28][29][30][31][32][33][34][35][36].…”
Section: Introductionmentioning
confidence: 99%