Showing 381 - 400 results of 418 for search '"edge computing"', query time: 0.07s Refine Results
  1. 381

    Task Offloading Optimization Using PSO in Fog Computing for the Internet of Drones by Sofiane Zaidi, Mohamed Amine Attalah, Lazhar Khamer, Carlos T. Calafate

    Published 2024-12-01
    “…This particularity makes it difficult to apply the conventional task offloading technologies, such as cloud computing and edge computing, in IoD environments. To address these limits, and to ensure a low task offloading delay, in this paper we propose PSO BS-Fog, a task offloading optimization that combines a particle swarm optimization (PSO) heuristic with fog computing technology for the IoD. …”
    Get full text
    Article
  2. 382

    A comparative study of machine learning algorithms for fall detection in technology-based healthcare system: Analyzing SVM, KNN, decision tree, random forest, LSTM, and CNN by Afuan Lasmedi, Isnanto R. Rizal

    Published 2025-01-01
    “…Additionally, this research opens avenues for optimizing deep learning models and leveraging edge computing technologies to reduce response times in wearable device applications.…”
    Get full text
    Article
  3. 383

    Edge-cloud collaboration empowered immersive Web3D by XU Yanan, ZHAO Guidan, FENG Daquan, SHI Wenzhe, LU Ping

    Published 2024-09-01
    “…The progression of cutting-edge technologies such as mobile Internet and 5G networks, coupled with the emergence of edge computing, has propelled Web3D service modes from solitary terminal or cloud-based rendering toward a collaborative edge-cloud paradigm. …”
    Get full text
    Article
  4. 384

    Effective Evolutionary Algorithm for Solving the Real-Resource-Constrained Scheduling Problem by Huu Dang Quoc, Loc Nguyen The, Cuong Nguyen Doan, Naixue Xiong

    Published 2020-01-01
    “…Real-RCPSP has become a critical issue in many fields such as resource allocation to perform tasks in Edge Computing or arranging robots at industrial production lines at factories and IoT systems. …”
    Get full text
    Article
  5. 385

    A Comprehensive Review of Artificial Intelligence Applications in the Photovoltaic Systems by Jiaming Hu, Boon-Han Lim, Xiaoyun Tian, Kang Wang, Dachuan Xu, Feng Zhang, Yong Zhang

    Published 2024-12-01
    “…Finally, we describe forward-looking solutions including transfer learning, few-shot learning, and edge computing, as well as the state of the art.…”
    Get full text
    Article
  6. 386

    SAFE-CAST: secure AI-federated enumeration for clustering-based automated surveillance and trust in machine-to-machine communication by Yusuf Kursat Tuncel, Kasım Öztoprak

    Published 2025-01-01
    “…This comprehensive solution addresses the pressing need for robust, efficient, and secure M2M communication in the evolving landscape of IoT and edge computing.…”
    Get full text
    Article
  7. 387

    Advancing eHealth in Society 5.0: A Fuzzy Logic and Blockchain-Enhanced Framework for Integrating IoMT, Edge, and Cloud With AI by Joy Dutta, Deepak Puthal

    Published 2024-01-01
    “…To advance eHealth within this vision, we present a comprehensive framework that integrates the Internet of Medical Things (IoMT), edge computing, and cloud services with Explainable Artificial Intelligence (XAI) and blockchain technology, customized for the 6G era. …”
    Get full text
    Article
  8. 388

    A privacy budget adaptive optimization scheme for federated computing power Internet of things by MA Wenyu, CHEN Qian, HU Yuxiang, YAN Haonan, HU Tao, YI Peng

    Published 2024-12-01
    “…In specific, to adaptively adjust privacy budgets, the privacy budget estimates for edge computing power nodes based on the Cramér-Rao lower bound theory were analyzed. …”
    Get full text
    Article
  9. 389

    Quantum-Inspired Multi-Scale Object Detection in UAV Imagery: Advancing Ultra-Small Object Accuracy and Efficiency for Real-Time Applications by Muhammad Muzammul, Muhammad Assam, Ayman Qahmash

    Published 2025-01-01
    “…It also establishes a foundation for future advancements, including scalability to diverse datasets, integration with edge computing platforms, and the exploration of quantum computing techniques. …”
    Get full text
    Article
  10. 390

    Entrepreneurial strategies for sustainable growth: a deep dive into cloud-native technology and its applications by T. A. Alka, Aswathy Sreenivasan, M. Suresh

    Published 2025-02-01
    “…Cloud-native technology supports innovative business models in entrepreneurship such as SaaS, serverless computing, managed Kubernetes, data analytics platforms, BaaS, and Edge Computing. The urgency to incorporate and develop new security features and tools for measurement is necessary. …”
    Get full text
    Article
  11. 391

    From data to diagnosis: leveraging deep learning in IoT-based healthcare by Miracle A. Atianashie, Chukwuma Chinaza Adaobi

    Published 2024-11-01
    “…The future of deep learning in healthcare IoT is geared toward enhancing data security, improving device integration, and creating patient-centric models through innovative technologies such as blockchain and edge computing. This article advocates for a collaborative approach to overcome barriers and accelerate the adoption of these technologies in mainstream healthcare settings.…”
    Get full text
    Article
  12. 392

    MonoSeg: An Infrared UAV Perspective Vehicle Instance Segmentation Model with Strong Adaptability and Integrity by Peng Huang, Yan Yin, Kaifeng Hu, Weidong Yang

    Published 2025-01-01
    “…Moreover, the computational constraints of edge computing platforms pose a fundamental challenge in balancing real-time processing requirements with detection performance. …”
    Get full text
    Article
  13. 393

    Fabrication of Hollow Needle Tips with Nanoholes by Plasma Maskless Processing and Calculation and Detection of Complex Surface Edges by Zuocai Dai, Sha Zhou, Tongguang Yang, Yanpeng Wang

    Published 2022-01-01
    “…In this study, a hollow needle tip with nanoholes was fabricated by plasma maskless processing, and use edge computing to calculate the complex surface shape of the needle tip. …”
    Get full text
    Article
  14. 394

    A Low-Power DNN Accelerator With Mean-Error-Minimized Approximate Signed Multiplier by Laimin Du, Leibin Ni, Xiong Liu, Guanqi Peng, Kai Li, Wei Mao, Hao Yu

    Published 2024-01-01
    “…Approximate computing is an emerging and effective method for reducing energy consumption in digital circuits, which is critical for energy-efficient performance improvement of edge-computing devices. In this paper, we propose a low-power DNN accelerator with novel signed approximate multiplier based on probability-optimized compressor and error compensation. …”
    Get full text
    Article
  15. 395

    Advancing UAV Communications: A Comprehensive Survey of Cutting-Edge Machine Learning Techniques by Chenrui Sun, Gianluca Fontanesi, Berk Canberk, Amirhossein Mohajerzadeh, Symeon Chatzinotas, David Grace, Hamed Ahmadi

    Published 2024-01-01
    “…Finally, the use of state-of-the-art ML algorithms in these capabilities is explored and their potential extension to cloud and/or edge computing based network architectures is highlighted.…”
    Get full text
    Article
  16. 396

    Improving Telemedicine through IoT and Cloud Computing: Opportunities and Challenges by M. Sunil Kumar, D. Ganesh

    Published 2024-09-01
    “…The reports highlight the necessity of more studies on the integration of artificial intelligence in telemedicine and the adoption of edge computing solutions to overcome cloud-related issues in low-connectivity scenarios. …”
    Get full text
    Article
  17. 397

    Energy-Efficient Aerial STAR-RIS-Aided Computing Offloading and Content Caching for Wireless Sensor Networks by Xiaoping Yang, Quanzeng Wang, Bin Yang, Xiaofang Cao

    Published 2025-01-01
    “…UAV-based WSNs equipped with mobile edge computing (MEC) servers effectively mitigate challenges associated with long-distance transmission and the limited coverage of edge base stations (BSs), emerging as a powerful paradigm for both communication and computing services. …”
    Get full text
    Article
  18. 398

    Sustainable Mobility in B5G/6G: V2X Technology Trends and Use Cases by Sandra Roger, Carmen Botella-Mascarell, David Martin-Sacristan, David Garcia-Roger, Jose F. Monserrat, Tommy Svensson

    Published 2024-01-01
    “…We start by identifying three current technology trends, namely, towards climate neutral; cloudification and edge computing; and Big Data and artificial intelligence, and then we examine their capability to enable sustainable Vehicle-to-Everything (V2X) communication systems in beyond 5G and 6G networks. …”
    Get full text
    Article
  19. 399

    Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology by Hailong MA, Liang WANG, Tao HU, Yiming JIANG, Yanze QU

    Published 2022-04-01
    “…Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.…”
    Get full text
    Article
  20. 400

    Analog Computing for Nonlinear Shock Tube PDE Models: Test and Measurement of CMOS Chip by Hasantha Malavipathirana, Soumyajit Mandal, Nilan Udayanga, Yingying Wang, S. I. Hariharan, Arjuna Madanayake

    Published 2025-01-01
    “…Analog CMOS has power efficiency advantages over digital CMOS for low-precision applications in edge computing, scientific computing, and artificial intelligence/machine learning (AI/ML) verticals. …”
    Get full text
    Article