Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
621
A Collaborative Story Writing Project Using Google Docs and Face-to-Face Collaboration
Published 2025-01-01“…The Google Docs application is part of Google Workspace for Education, a suite of cloud-based productivity and collaboration tools that are now ubiquitous in middle and high school classrooms. …”
Get full text
Article -
622
Research and Implementation of Intelligent Home Pension System Based on Speech and Semantic Recognition
Published 2022-01-01“…In this method, data transmission, instruction uploading, and receiving are completed by designing the communication interface of home appliance terminal to build the wireless intelligent home communication subsystem, and the voice module of IfI is adopted. The intelligent cloud is selected as the development cloud platform, and the related hardware is selected to realize the remote data communication. …”
Get full text
Article -
623
Systematic Thinking and Evaluation of Construction Quality Management Standardization of Power Engineering in China
Published 2022-01-01“…Subsequently, the G1 method is used to determine the weight of each index, and the cloud model method is used to implement the evaluation process. …”
Get full text
Article -
624
Resource Assignment Algorithms for Autonomous Mobile Robots with Task Offloading
Published 2025-01-01“…The robots, due to limited onboard computation resources, need to offload some complex computing tasks to an edge/cloud server, requiring artificial intelligence and high computation loads. …”
Get full text
Article -
625
New Similarity of Triangular Fuzzy Number and Its Application
Published 2014-01-01“…A collaborative filtering case is used to illustrate users’ similarity based on cloud model and triangular fuzzy number; the result indicates that users’ similarity based on triangular fuzzy number can obtain better discrimination. …”
Get full text
Article -
626
-
627
-
628
Road Adhesion Coefficient Estimation Based on Vehicle-Road Coordination and Deep Learning
Published 2023-01-01“…Firstly, a vehicle-based data feedback system combined with a vehicle-road network cloud is introduced, and CarSim simulation is used to expand the data set and train the model effectively. …”
Get full text
Article -
629
A fair multi-resource allocation mechanism for time-varying discrete jobs with placement constraints
Published 2024-12-01“…A key issue in resource sharing in cloud computing is how to fairly and efficiently allocate the multi-resources to users with dynamic demand. …”
Get full text
Article -
630
Numerical Simulation and Analysis of Diffusion Process for the Leakages of a Tunnel LNG Pipeline
Published 2020-01-01“…From the simulation results, the variation of CH4 concentration field and explosive gas cloud with time within the tunnel, and the influence of leakage location on the diffusion was analyzed for the three cases. …”
Get full text
Article -
631
Analysis and Evaluation of Intel Software Guard Extension-Based Trusted Execution Environment Usage in Edge Intelligence and Internet of Things Scenarios
Published 2025-01-01“…In recent years, Trusted Execution Environment (TEE) has emerged as a promising technology for securing cloud data storage and cloud processing, demonstrating significant potential for ensuring data and application confidentiality in more scenarios. …”
Get full text
Article -
632
ANTHROPOMETRIC MEASUREMENT BASED ON STRUCTURE FROM MOTION IMAGING TECHNIQUE
Published 2016-12-01“…With use of VisualSFM software a virtual cloud of points representing real points of examined object was calculated. …”
Get full text
Article -
633
Research on heterogeneous data fusion and arithmetic optimization in multi-sensor systems
Published 2024-12-01“…Secondly, a three-layer "cloud-edge-end" architecture was implemented, leveraging edge servers to offload computational pressure from cloud servers, optimizing task scheduling strategies, and enabling coordinated management of network and computing resources. …”
Get full text
Article -
634
Classification of Iranian weather types based on Woś method
Published 2025-06-01“…The findings indicated that the predominant temperature types in the country are primarily categorized as hot and very hot, with sub-codes reflecting generally low to moderate cloud cover and negligible precipitation. Furthermore, the application of Ward's clustering method facilitated the identification of three distinct climatic groups. …”
Get full text
Article -
635
Satellite In-Orbit Secondary Collision Risk Assessment
Published 2022-01-01“…A modified spacecraft impact disintegration model then is used to calculate the collision results and estimate the collision threat level of the short-term debris cloud formed by the Starlink satellite after its destruction to satellites in the same orbit. …”
Get full text
Article -
636
Selection and Ranking of Fog Computing-Based IoT for Monitoring of Health Using the Analytic Network Approach
Published 2021-01-01“…FC progresses the prototype of cloud computing to network edge leading various possibilities and services. …”
Get full text
Article -
637
A Privacy-Preserving Outsourcing Data Storage Scheme with Fragile Digital Watermarking-Based Data Auditing
Published 2016-01-01“…Cloud storage has been recognized as the popular solution to solve the problems of the rising storage costs of IT enterprises for users. …”
Get full text
Article -
638
Analysis on the Prewarning Distance of Expressway Traffic Based on Lane-Selection Cell Transmission Model
Published 2023-01-01Get full text
Article -
639
Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things
Published 2024-01-01“…To begin, we offer an IoT data encryption strategy in which edge devices can send data to a nearby cloud network for data processing while maintaining privacy. …”
Get full text
Article -
640
Analysis of Bulk Queueing Model with Load Balancing and Vacation
Published 2024-12-01“…In this paper, we incorporated the load-balancing technique used in cloud computing with power business intelligence (BI) and cloud load based on the queueing theoretic approach. …”
Get full text
Article