Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
5401
Single-cell RNA-seq data have prevalent blood contamination but can be rescued by Originator, a computational tool separating single-cell RNA-seq by genetic and contextual informat...
Published 2025-03-01“…Abstract Single-cell RNA sequencing (scRNA-seq) data from complex human tissues have prevalent blood cell contamination during the sample preparation process. They may also comprise cells of different genetic makeups. …”
Get full text
Article -
5402
Parallel and distributed chimp-optimized LSTM for oil well-log reconstruction in China
Published 2025-07-01“…PDCOA’s primary goal is to speed up the process of hyperparameter tuning for LSTMs by letting them work in parallel and across multiple computers, with separate groups of computers communicating with each other regularly to ensure the system is diverse and reliable. …”
Get full text
Article -
5403
Damage toughness assessment method of power backbone communication network based on power big data
Published 2023-05-01“…The damage toughness assessment method of power backbone communication network based on power big data was studied, and the damage toughness assessment results were used to formulate protection strategies and improve the network survivability.The power backbone communication network and the attacker were set as the two sides of the game, and the Nash equilibrium strategy of both sides was determined by the minimax method.The damage probability of nodes was obtained by the Nash equilibrium strategy, and the node damage probability was transformed into the network damage form.According to the network damage pattern, the repair conditions contained in the power big data were obtained by cloud computing technology.According to the importance of each node, the repair resources and repair budget were allocated to the nodes in order.The performance time-history response curve of the power backbone communication network was constructed, and the dynamic evaluation results of the network damage toughness were output.The experimental results show that all operations using cloud computing technology to process massive power big data can not exceed 330 ms.When the repair budget and repair resources are the highest, the damage toughness of the power backbone communication network can reach 0.925 at most, indicating that this method can effectively evaluate the damage toughness of the power backbone communication network.…”
Get full text
Article -
5404
Quality of Experience Optimization for AR Service in an MEC Federation System
Published 2025-01-01“…Augmented reality (AR) in the internet of things requires ultra-low latency, high-resolution video, and fairness in multi-user environments, which pose challenges for traditional cloud and edge computing. To address this shortcoming, we studied AR subtask offloading and resource allocation in a multi-hop, multi-access edge computing federation. …”
Get full text
Article -
5405
Damage toughness assessment method of power backbone communication network based on power big data
Published 2023-05-01“…The damage toughness assessment method of power backbone communication network based on power big data was studied, and the damage toughness assessment results were used to formulate protection strategies and improve the network survivability.The power backbone communication network and the attacker were set as the two sides of the game, and the Nash equilibrium strategy of both sides was determined by the minimax method.The damage probability of nodes was obtained by the Nash equilibrium strategy, and the node damage probability was transformed into the network damage form.According to the network damage pattern, the repair conditions contained in the power big data were obtained by cloud computing technology.According to the importance of each node, the repair resources and repair budget were allocated to the nodes in order.The performance time-history response curve of the power backbone communication network was constructed, and the dynamic evaluation results of the network damage toughness were output.The experimental results show that all operations using cloud computing technology to process massive power big data can not exceed 330 ms.When the repair budget and repair resources are the highest, the damage toughness of the power backbone communication network can reach 0.925 at most, indicating that this method can effectively evaluate the damage toughness of the power backbone communication network.…”
Get full text
Article -
5406
Federated deep reinforcement learning-based edge collaborative caching strategy in space-air-ground integrated network
Published 2025-01-01“…To address the problem of limited network coverage in remote areas, combining space-air-ground integrated network with mobile edge computing could provide low-latency and high-reliability transmissions for user requests in these areas, as well as timely caching services. …”
Get full text
Article -
5407
5G defense network using commercial gNodeB with zero trust architecture
Published 2025-06-01Get full text
Article -
5408
-
5409
Gaussian process latent variable models-ANN based method for automatic features selection and dimensionality reduction for control of EMG-driven systems
Published 2025-01-01“…This approach aims to improve the classification accuracy of EMG signals while substantially reducing computational costs, offering valuable implications for all EMG-related processes on such data. …”
Get full text
Article -
5410
A GDPR-compliant solution for analysis of large-scale genomics datasets on HPC cloud infrastructure
Published 2025-02-01“…Abstract This paper outlines the technical and organizational measures implemented by the Italian supercomputing center, CINECA, to efficiently collect, process, and store sensitive-omics data in compliance with GDPR regulations. …”
Get full text
Article -
5411
DRL-Driven Intelligent SFC Deployment in MEC Workload for Dynamic IoT Networks
Published 2025-07-01“…The framework introduces task offloading and a dynamic resource orchestration strategy, where task offloading to the MEC server ensures an efficient distribution of computation workloads. The dynamic resource orchestration process, Service Function Chaining (SFC) for Virtual Network Functions (VNFs) placement, and routing path determination optimize service execution across the network. …”
Get full text
Article -
5412
Demand Response Management with Latency Difference in Distributed Wireless Network
Published 2025-01-01“…Notably, the local solution can handle, in terms of the emergency DR, the emergency tasks in time, and the centralized processing solution can update and process the general DR.…”
Get full text
Article -
5413
Addressing process-induced porosity variations in multiscale composite materials analysis using aggregated projection clustering and Halton sequence RVE sampling
Published 2025-07-01“…To address this, we propose an unsupervised machine learning approach integrated with micro-computed tomography (μCT) image processing and Asymptotic Homogenization (AH) for accurate and robust consideration of real microstructure as the basis for an upscaling process. …”
Get full text
Article -
5414
Towards smart fruit dryers: Integrating machine vision and response surface methodology for multi-objective monitoring and optimization of kiwifruit drying process
Published 2025-06-01“…This study aimed to monitor and optimize the kiwifruit drying process in a combined convection–infrared hot air dryer using computer vision and Response Surface Methodology (RSM). …”
Get full text
Article -
5415
-
5416
HyperCell: A Bio-inspired Design Framework for Real-time Interactive Architectures
Published 2018-01-01“…“Form” has always been the most critical focus in architectural design, and this focus has also been a major driver behind the application computational design in Architecture. Nonetheless, this research will interpret the term “Form” in architecture as a continual “information processor” rather than the result of information processing. …”
Get full text
Article -
5417
Framework for Analysis of Queueing Systems with Correlated Arrival Processes and Simultaneous Service of a Restricted Number of Customers in Scenarios with an Infinite Buffer and R...
Published 2024-11-01“…This chain behaves as the finite-state quasi-death process between successive service-beginning epochs, with jumps occurring at these epochs. …”
Get full text
Article -
5418
Context-dependent similarity analysis of analogue series for structure–activity relationship transfer based on a concept from natural language processing
Published 2025-01-01“…Pairs of active AS consisting of compounds with corresponding substituents and comparable potency progression represent SAR transfer events for the same target or across different targets. We report a new computational approach to systematically search for SAR transfer series that combines an AS alignment algorithm with context-depending similarity assessment based on vector embeddings adapted from natural language processing. …”
Get full text
Article -
5419
-
5420
Double Deep Q-Network-Based Solution to a Dynamic, Energy-Efficient Hybrid Flow Shop Scheduling System with the Transport Process
Published 2025-02-01“…In addition, 36 test instances of varying sizes, simplified from the excavator boom manufacturing process, are designed for comparative experiments with traditional algorithms. …”
Get full text
Article