Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
2161
DGA domain detection and botnet prevention using Q-learning for POMDP
Published 2021-03-01Subjects: Get full text
Article -
2162
Research on cloud computing users’ public safety trust model based on scorecard-random forest
Published 2018-05-01“…Traditional cloud computing trust models mainly focused on the calculation of the trust of users’ behavior.In the process of classification and evaluation,there were some problems such as ignorance of content security and lack of trust division verification.Aiming to solve these problems,cloud computing users’ public safety trust model based on scorecard-random forest was proposed.Firstly,the text was processed using Word2Vec in the data preprocessing stage.The convolution neural network (CNN) was used to extract the sentence features for user content tag classification.Then,scorecard method was used to filter the strong correlation index.Meanwhile,in order to establish the users’ public safety trust evaluation model in cloud computing,a random forest method was applied.Experimental results show that the proposed users’ public safety trust evaluation model outperforms the general trust evaluation model.The proposed model can effectively distinguish malicious users from normal users,and it can improve the efficiency of the cloud computing users management.…”
Get full text
Article -
2163
Research on deep reinforcement learning in Internet of vehicles edge computing based on Quasi-Newton method
Published 2024-05-01“…The algorithm was designed by initially incorporating batch normalization techniques to optimize the training process of deep neural networks. Subsequently, optimization was performed using the Quasi-Newton method to effectively approximate the optimal solution. …”
Get full text
Article -
2164
Multi objective reinforcement learning driven task offloading algorithm for satellite edge computing networks
Published 2025-07-01“…Abstract Satellite edge computing (SEC) has become a revolutionary paradigm to improve the quality of service, reduce the pressure on satellite-terrestrial backhaul bandwidth and reduce the average response delay of task requests. …”
Get full text
Article -
2165
Fuzzy clustering based scheduling algorithm for minimizing the tasks completion time in cloud computing environment
Published 2025-06-01“…Abstract This paper explores the complexity of project planning in a cloud computing environment and recognizes the challenges associated with distributed resources, heterogeneity, and dynamic changes in workloads. …”
Get full text
Article -
2166
Intelligent Optimization of Wireless Sensor Networks through Bio-Inspired Computing: Survey and Future Directions
Published 2013-02-01“…Interdisciplinary research is playing a splendid contribution for various problems' solving. The process of combining the individuals' output to form a single problem solving solution is depicted in three-stage ensemble design. …”
Get full text
Article -
2167
Single-cell mutational burden distributions in birth-death processes.
Published 2025-07-01Get full text
Article -
2168
High-throughput alloy and process design for metal additive manufacturing
Published 2025-06-01“…Evaluating alloy printability requires extensive analysis of chemical composition and processing conditions. The complexity of experimental exploration drives the need for high-throughput computational frameworks. …”
Get full text
Article -
2169
An AI-based framework for improving efficiency and fairness in the interview process
Published 2025-06-01Get full text
Article -
2170
Observation of the non-Hermitian skin effect and Fermi skin on a digital quantum computer
Published 2025-02-01“…Here, we report the observation of the NHSE and its many-fermion analog on a universal quantum processor. To implement NHSE accumulation on a quantum computer, the time-evolution circuit not only needs to be non-reciprocal and non-unitary, but must also contain sufficiently many lattice qubits. …”
Get full text
Article -
2171
Dynamic QoS-aware intelligent edge computing resource management algorithm for body area networks
Published 2024-12-01“…Firstly, considering the Markov nature of multi-source task priorities and channel state changes in BAN, the original stochastic optimization problem was transformed into an infinite horizon Markov decision process problem. Then, a multi-source task priority sequence for each BAN was constructed and an online decision-making method that integrated proximal policy optimization (PPO) was proposed for task offloading and computing resource allocation. …”
Get full text
Article -
2172
A Prototyping and Evaluation of Hospital Dashboard through End-User Computing Satisfaction Model (EUCS)
Published 2018-10-01“…In today's competitive environment, one of the new tools in the field ofinformation technology is business or organizational dashboards that are as abackup in the process of strategic management of organizations. …”
Get full text
Article -
2173
ScalEdge: A framework for scalable edge computing in Internet of things–based smart systems
Published 2021-07-01“…The Internet of things (IoT) devices are resource-constrained, unable to process compute-intensive tasks. The convergence of edge computing and IoT with computation offloading offers a feasible solution in terms of performance. …”
Get full text
Article -
2174
An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios
Published 2020-05-01“…Since the fog computing center only has a part of the private key generated using the identity information, the security of the system will not be damaged due to the leakage of part of the private key held by the fog center, and the fog center significantly participates in the signature generation process, which significantly reduces the computation and communication overhead of the Internet of things device. …”
Get full text
Article -
2175
A data and knowledge-driven practice for ensuring stability in ultra-large intelligent computing clusters
Published 2025-07-01“…A data and knowledge-driven stability assurance scheme for such clusters was proposed to address the issues of frequent hardware failures, persistently high task training failure rates, and difficulties in cross-domain problem localization within ultra-large intelligent computing clusters with over ten thousand computing cards. …”
Get full text
Article -
2176
Preface to Special Issue on Scientific Computing and Learning Analytics for Smart Healthcare Systems (Part II)
Published 2024-06-01“… This special issue introduces emerging intelligent healthcare technologies that incorporate big medical data, artificial intelligence, scientific computing, federated learning, bio-inspired computation, the Internet of Medical Things, security and privacy, semantic databases, etc. …”
Get full text
Article -
2177
An energy-saving virtual machine scheduling algorithm for resource management based on cloud computing technology
Published 2025-04-01“…In this paper, the current research status of cloud computing and virtual machine scheduling in cloud computing environments is analyzed, and the concept and characteristics, classification, application scenarios, and key technologies of cloud computing are elaborated. …”
Get full text
Article -
2178
Service Virtualization Using a Non-von Neumann Parallel, Distributed, and Scalable Computing Model
Published 2012-01-01“…This paper describes a prototype implementing a high degree of transaction resilience in distributed software systems using a non-von Neumann computing model exploiting parallelism in computing nodes. …”
Get full text
Article -
2179
Real-time human-robot interaction and service provision using hybrid intelligent computing framework.
Published 2025-01-01“…This research introduces a Hybrid Intelligent Computing Model (HICM) to improve robots' ability to process inquiries autonomously. …”
Get full text
Article -
2180
Paint shop vehicle sequencing based on quantum computing considering color changeover and painting quality
Published 2024-02-01“…With typically hundreds of vehicles in one shift, the paint shop sequencing problem is intractable in classical computing. In this paper, we propose to solve a general paint shop sequencing problem using state-of-the-art quantum computing algorithms. …”
Get full text
Article