Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
5201
La écfrasis en el Libro de Alexandre, un proyecto de edición digital para el estudio de la poesía clerical castellana del siglo XIII con minimal computing
Published 2023-08-01“…Secondly, I describe the process of semantic enrichment of the text, the XML-TEI encoding, and the minimal computing approach. …”
Get full text
Article -
5202
-
5203
Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption
Published 2021-05-01“…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
Get full text
Article -
5204
Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption
Published 2021-05-01“…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
Get full text
Article -
5205
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
Published 2021-01-01“…Aiming at the problem of complex multi-step attack detection, the method of attack scenario construction oriented to cloud computing environment was studied.Firstly, a dynamic probabilistic attack graph model was constructed, and a probabilistic attack graph updating algorithm was designed to make it update periodically with the passage of time and space, so as to adapt to the elastic and dynamic cloud computing environment.Secondly, an attack intention inference algorithm and a maximum probability attack path inference algorithm were designed to solve the uncertain problems such as error and fracture of attack scenarios caused by false positive or false negative, and ensure the accuracy of attack scenario.Meanwhile, the attack scenario was dynamically evolved along with the dynamic probability attack graph to ensure the completeness and freshness of the attack scenario.Experimental results show that the proposed method can adapt to the elastic and dynamic cloud environment, restore the penetration process of attacker’s and reconstruct high-level attack scenario, and so provide certain references for building supervised and accountable cloud environment.…”
Get full text
Article -
5206
Optimized Trust Prediction and Multi-Criteria Framework for Task and Data Collector Selection Using Deep Learning in Ubiquitous Environments
Published 2025-01-01“…In crowdsourcing and ubiquitous computing environments, efficient task assignment and data collector selection are vital for system performance and profitability. …”
Get full text
Article -
5207
-
5208
Resource Allocation for Edge-enhanced Distributed Power Wireless Sensor Network
Published 2023-08-01“…Then, the total resource processing capacity of the central unit/distribution unit is determined by controlling the waiting latency in the load transfer process under the common constraints of the remaining resources of the RF remote unit, the load queuing latency, and the remaining resources of the central unit/distribution unit. …”
Get full text
Article -
5209
Research on variable-length control chart pattern recognition based on sliding window method and SECNN-BiLSTM
Published 2025-02-01“…Abstract Control charts, as essential tools in Statistical Process Control (SPC), are frequently used to analyze whether production processes are under control. …”
Get full text
Article -
5210
AIoT Monitoring for Early Identification of Diseases in Grapevines: Complete Study
Published 2025-01-01“…Cloud computing facilitates data processing and real-time visualization, allowing farmers to make timely, data-driven decisions for disease control. …”
Get full text
Article -
5211
An all integer-based spiking neural network with dynamic threshold adaptation
Published 2024-12-01“…Due to this all integer-based quantization process, the required computational operations are significantly reduced, potentially providing a substantial energy efficiency advantage for numerous edge computing applications.…”
Get full text
Article -
5212
Enhancing Cloud Task Scheduling With a Robust Security Approach and Optimized Hybrid POA
Published 2023-01-01“…The allocation of computational tasks in a cloud environment is a complicated process that is affected by multiple factors, such as available network bandwidth, make span, and cost considerations. …”
Get full text
Article -
5213
Tuning the Resistance of a VO2 Junction by Focused Laser Beam and Atomic Force Microscopy
Published 2025-02-01Get full text
Article -
5214
Mind vs. machine: Comparative analysis of metaphor-related word translation by human and AI systems
Published 2025-03-01Subjects: Get full text
Article -
5215
-
5216
Solving implementation issues of Permutation Monte Carlo in different network reliability contexts
Published 2025-05-01Get full text
Article -
5217
Investigation and Empirical Analysis of Transfer Learning for Industrial IoT Networks
Published 2024-01-01“…This paper examines the role of Transfer Learning in IIoT-N, identifying research gaps and challenges, and highlights its potential across various industrial applications, including predictive maintenance, anomaly detection, edge computing, process optimization, and cross-domain knowledge transfer. …”
Get full text
Article -
5218
Inline Wear Detection in High-Speed Progressive Dies Using Photometric Stereo
Published 2025-01-01“…By assigning anomalies to distinct process stages, the system enhances defect diagnosis. …”
Get full text
Article -
5219
Improved FFT-based alpha-stable density approximation algorithm
Published 2007-01-01“…Approximation of density of α-stable process is an elementary works in modeling network flow using α-stable process.Combining the mathematical properties of characteristic function of α-stable process with the traditional approximating algorithm,an improved FFT-based algorithm was proposed.The improved algorithm has 2 noticeable features: automatically choosing the sampling space and sampling interval,importing frequency expansion.Experiments show that it can decrease calculation complexity and effectively control computation error.…”
Get full text
Article -
5220