-
381
Task Offloading Optimization Using PSO in Fog Computing for the Internet of Drones
Published 2024-12-01“…This particularity makes it difficult to apply the conventional task offloading technologies, such as cloud computing and edge computing, in IoD environments. To address these limits, and to ensure a low task offloading delay, in this paper we propose PSO BS-Fog, a task offloading optimization that combines a particle swarm optimization (PSO) heuristic with fog computing technology for the IoD. …”
Get full text
Article -
382
A comparative study of machine learning algorithms for fall detection in technology-based healthcare system: Analyzing SVM, KNN, decision tree, random forest, LSTM, and CNN
Published 2025-01-01“…Additionally, this research opens avenues for optimizing deep learning models and leveraging edge computing technologies to reduce response times in wearable device applications.…”
Get full text
Article -
383
Edge-cloud collaboration empowered immersive Web3D
Published 2024-09-01“…The progression of cutting-edge technologies such as mobile Internet and 5G networks, coupled with the emergence of edge computing, has propelled Web3D service modes from solitary terminal or cloud-based rendering toward a collaborative edge-cloud paradigm. …”
Get full text
Article -
384
Effective Evolutionary Algorithm for Solving the Real-Resource-Constrained Scheduling Problem
Published 2020-01-01“…Real-RCPSP has become a critical issue in many fields such as resource allocation to perform tasks in Edge Computing or arranging robots at industrial production lines at factories and IoT systems. …”
Get full text
Article -
385
A Comprehensive Review of Artificial Intelligence Applications in the Photovoltaic Systems
Published 2024-12-01“…Finally, we describe forward-looking solutions including transfer learning, few-shot learning, and edge computing, as well as the state of the art.…”
Get full text
Article -
386
SAFE-CAST: secure AI-federated enumeration for clustering-based automated surveillance and trust in machine-to-machine communication
Published 2025-01-01“…This comprehensive solution addresses the pressing need for robust, efficient, and secure M2M communication in the evolving landscape of IoT and edge computing.…”
Get full text
Article -
387
Advancing eHealth in Society 5.0: A Fuzzy Logic and Blockchain-Enhanced Framework for Integrating IoMT, Edge, and Cloud With AI
Published 2024-01-01“…To advance eHealth within this vision, we present a comprehensive framework that integrates the Internet of Medical Things (IoMT), edge computing, and cloud services with Explainable Artificial Intelligence (XAI) and blockchain technology, customized for the 6G era. …”
Get full text
Article -
388
A privacy budget adaptive optimization scheme for federated computing power Internet of things
Published 2024-12-01“…In specific, to adaptively adjust privacy budgets, the privacy budget estimates for edge computing power nodes based on the Cramér-Rao lower bound theory were analyzed. …”
Get full text
Article -
389
Quantum-Inspired Multi-Scale Object Detection in UAV Imagery: Advancing Ultra-Small Object Accuracy and Efficiency for Real-Time Applications
Published 2025-01-01“…It also establishes a foundation for future advancements, including scalability to diverse datasets, integration with edge computing platforms, and the exploration of quantum computing techniques. …”
Get full text
Article -
390
Entrepreneurial strategies for sustainable growth: a deep dive into cloud-native technology and its applications
Published 2025-02-01“…Cloud-native technology supports innovative business models in entrepreneurship such as SaaS, serverless computing, managed Kubernetes, data analytics platforms, BaaS, and Edge Computing. The urgency to incorporate and develop new security features and tools for measurement is necessary. …”
Get full text
Article -
391
From data to diagnosis: leveraging deep learning in IoT-based healthcare
Published 2024-11-01“…The future of deep learning in healthcare IoT is geared toward enhancing data security, improving device integration, and creating patient-centric models through innovative technologies such as blockchain and edge computing. This article advocates for a collaborative approach to overcome barriers and accelerate the adoption of these technologies in mainstream healthcare settings.…”
Get full text
Article -
392
MonoSeg: An Infrared UAV Perspective Vehicle Instance Segmentation Model with Strong Adaptability and Integrity
Published 2025-01-01“…Moreover, the computational constraints of edge computing platforms pose a fundamental challenge in balancing real-time processing requirements with detection performance. …”
Get full text
Article -
393
Fabrication of Hollow Needle Tips with Nanoholes by Plasma Maskless Processing and Calculation and Detection of Complex Surface Edges
Published 2022-01-01“…In this study, a hollow needle tip with nanoholes was fabricated by plasma maskless processing, and use edge computing to calculate the complex surface shape of the needle tip. …”
Get full text
Article -
394
A Low-Power DNN Accelerator With Mean-Error-Minimized Approximate Signed Multiplier
Published 2024-01-01“…Approximate computing is an emerging and effective method for reducing energy consumption in digital circuits, which is critical for energy-efficient performance improvement of edge-computing devices. In this paper, we propose a low-power DNN accelerator with novel signed approximate multiplier based on probability-optimized compressor and error compensation. …”
Get full text
Article -
395
Advancing UAV Communications: A Comprehensive Survey of Cutting-Edge Machine Learning Techniques
Published 2024-01-01“…Finally, the use of state-of-the-art ML algorithms in these capabilities is explored and their potential extension to cloud and/or edge computing based network architectures is highlighted.…”
Get full text
Article -
396
Improving Telemedicine through IoT and Cloud Computing: Opportunities and Challenges
Published 2024-09-01“…The reports highlight the necessity of more studies on the integration of artificial intelligence in telemedicine and the adoption of edge computing solutions to overcome cloud-related issues in low-connectivity scenarios. …”
Get full text
Article -
397
Energy-Efficient Aerial STAR-RIS-Aided Computing Offloading and Content Caching for Wireless Sensor Networks
Published 2025-01-01“…UAV-based WSNs equipped with mobile edge computing (MEC) servers effectively mitigate challenges associated with long-distance transmission and the limited coverage of edge base stations (BSs), emerging as a powerful paradigm for both communication and computing services. …”
Get full text
Article -
398
Sustainable Mobility in B5G/6G: V2X Technology Trends and Use Cases
Published 2024-01-01“…We start by identifying three current technology trends, namely, towards climate neutral; cloudification and edge computing; and Big Data and artificial intelligence, and then we examine their capability to enable sustainable Vehicle-to-Everything (V2X) communication systems in beyond 5G and 6G networks. …”
Get full text
Article -
399
Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
Published 2022-04-01“…Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.…”
Get full text
Article -
400
Analog Computing for Nonlinear Shock Tube PDE Models: Test and Measurement of CMOS Chip
Published 2025-01-01“…Analog CMOS has power efficiency advantages over digital CMOS for low-precision applications in edge computing, scientific computing, and artificial intelligence/machine learning (AI/ML) verticals. …”
Get full text
Article