Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
1081
New cross-layer reputation mechanism for mobile cloud computing
Published 2018-03-01“…Users are facing increasingly serious security threats such as data leakage and privacy exposure while using various mobile cloud services.Based on the data security and privacy protection for mobile cloud computing research background,combining the cross-layer design and credit mechanism,in the node between the introduction of the MAC layer and network layer in the process of credit evaluation of factors affecting user reputation,to identify and manage internal malicious nodes.The credibility of the simulation results show that the proposed mechanism can effectively resist the internal defamation and multilayer attack,enhance the credibility of mobile terminals,thus improve the mobile cloud service data security and privacy protection.…”
Get full text
Article -
1082
Technology development mode of communication/sensing/computing/intelligence integration
Published 2022-03-01“…Various new functions and services related to communication/sensing/computing/intelligence have been targeted, developed and fused into the existing 5G-Advanced and emerging 6G new system.The technical scenarios and use cases of communication/sensing/computing/intelligence integration and its expectation for technique mode requirementin 5G-Advanced and 6G different phases were addressed, meanwhile five characteristics of its technology development mode were extracted.The proposed viewpoints may guide the research and development of 5G-Advanced system and standardization process of 6G new system in future, leading to more effective and profitable applications and maximization of business value from communication/sensing/computing/intelligence integration.…”
Get full text
Article -
1083
Design method of secure computing protocol for deep neural network
Published 2020-08-01“…Aiming at the information leakage problem in the process of deep neural network model calculation,a series of secure and efficient interactive computing protocols were designed between two non-collusive edge servers in combination with the additive secret sharing scheme.Since the nonlinear function cannot be split directly,a set of basic conversion protocols were proposed to realize the secure conversion of additive and multiplicative shares.After a few invokes,the power,comparison,exponential,logarithm,division and other low-level functions can be calculated securely.Due to the characteristics of data transfer and computation,the proposed protocols can be extended to array computation.Theoretical analysis ensures the correctness,efficiency and security of these protocols.The experimental results show that the error of these protocols is negligible,and the computational costs and communication overhead are better than the existing schemes.…”
Get full text
Article -
1084
Exploration and practice of data quality governance in privacy computing scenarios
Published 2022-09-01“…Privacy computing is a new data processing technology, which can realize the transformation and circulation of a data value on the premise of protecting data privacy and security.However, the invisible feature of data in private computing scenarios poses a great challenge to traditional data quality management.There is still a lack of perfect solutions.To solve the above problems in the industry, a data quality governance method and process suitable for privacy computing scenarios were proposed.A local and multi-party data quality evaluation system was constructed, which could take into account the data quality governance of the local domain and the federal domain.At the same time, a data contribution measurement method was proposed to explore the long-term incentive mechanism of privacy computing, improve the data quality of privacy computing, and improve the accuracy of computing results.…”
Get full text
Article -
1085
Building method of distributed COW disk on network computing environment
Published 2012-07-01“…Aiming to distributed computing and data centralizing storage in large-scale network computing environments and combining sparse and bursting characteristic of COW(copy-on-write) disk storing modified data blocks,the distributed COW network disk architecture was presented.The system building process of network computing environments was speeded up by apportioning the aggregation spending that server manages all related COW disks of client hosts to each client host.A improving 64bit bitmap compress arithmetic was designed to reduce the size of COW disk’s bitmap,so server disk space was saved and the network communication spending of distributed COW disk was less.The modified prefetching arithmetic based on COW bursting blocks was presented to improve the hit rate of Cache relating with distributed COW disk.Experiments on the prototype show that the distributed COW mechanism can effectively reduce system building latency of multi-client hosts network computing environment based on improving COW bitmap compress and prefetching arithmetic.…”
Get full text
Article -
1086
Cognitive Computing and Business Intelligence Applications in Accounting, Finance and Management
Published 2025-02-01“…Cognitive computing encompasses computing tools and methods that simulate and mimic the process of human thinking, without human supervision. …”
Get full text
Article -
1087
Fermionic wave packet scattering: a quantum computing approach
Published 2025-02-01“…Quantum computing provides a novel avenue towards simulating dynamical phenomena, and, in particular, scattering processes relevant for exploring the structure of matter. …”
Get full text
Article -
1088
Cloud Computing Services: Benefits, Risks and Intellectual Property Issues
Published 2014-05-01“…Patent strategy of certain proprietary software companies leaded to a veritable “patent war” and “patent arm race” endangering the process of standardization in software industry, especially in cloud computing. …”
Get full text
Article -
1089
An Autonomous Planning Model for Deploying IoT Services In Fog Computing
Published 2024-02-01“…Therefore, processing, analysis and storage are closer to the source of data and end users cause the delay is reduced. …”
Get full text
Article -
1090
Scope for Applications Management in India of Soft Computing in effective Classroom
Published 2022-01-01“…Soft computing has the potential to address the issues.…”
Get full text
Article -
1091
Hybrid quantum and in-memory computing for accelerating solving Simon’s problem
Published 2025-06-01“…While quantum algorithms can exponentially reduce the complexity of Simon’s problem, the overall computational complexity remains O(n3), which is imposed by the process of solving a system of linear equations in modulo 2 arithmetic (Mod-2 LEs). …”
Get full text
Article -
1092
Key metrics for monitoring performance variability in edge computing applications
Published 2025-05-01“…Edge computing systems typically consist of heterogeneous processing and networking components, resulting in inconsistent task performance. …”
Get full text
Article -
1093
Application of edge computing technology in smart grid data security
Published 2025-02-01“…Absrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings users response delay, service quality degradation and other problems, the author proposes the application of edge computing technology in smart grid data security. …”
Get full text
Article -
1094
CMOS Single-Photon Avalanche Diode Circuits for Probabilistic Computing
Published 2024-01-01“…Measured results from the SPAD design space show that even extremely small SPADs are suitable for probabilistic computing purposes, and that high dark count rates are not detrimental either, so SPADs for probabilistic computing are actually easier to integrate in standard CMOS processes. …”
Get full text
Article -
1095
Cognitive Computing with Large Language Models for Student Assessment Feedback
Published 2025-04-01“…While traditional assessment methods emphasise both achievements and development areas, the process remains time-intensive for educators. This research explores the application of cognitive computing, specifically open-source Large Language Models (LLMs) Mistral-7B and CodeLlama-7B, to streamline feedback generation for student reports containing both Python programming elements and English narrative content. …”
Get full text
Article -
1096
Energy-Accuracy Trade-Offs for Resistive In-Memory Computing Architectures
Published 2024-01-01“…Resistive in-memory computing (IMC) architectures currently lag behind SRAM IMCs and digital accelerators in both energy efficiency and compute density due to their low compute accuracy. …”
Get full text
Article -
1097
Load balancing for high performance computing using quantum annealing
Published 2025-01-01“…Load balancing is the distribution of computational work between available processors. Here, we investigate the application of quantum annealing to load balance two paradigmatic algorithms in high-performance computing. …”
Get full text
Article -
1098
Investigation on Evolutionary Computation Techniques of a Nonlinear System
Published 2011-01-01Get full text
Article -
1099
Proposal for a Security Management in Cloud Computing for Health Care
Published 2014-01-01“…Starting with a framework of general information security management processes derived from standards of the ISO 27000 family the most important information security processes for health care organizations using cloud computing will be identified considering the main risks regarding cloud computing and the type of information processed. …”
Get full text
Article -
1100
Information and Computing Ecosystem’s Architecture for Monitoring and Forecasting Natural Disasters
Published 2024-12-01“…However, there is a great disunity among methods and means of data analysis, formats and interfaces of storing and providing data, and software and information systems for data processing. As part of a large project to create a planetary observatory that combines data from spatially distributed geosphere monitoring systems, the efforts of leading institutes of the Russian Academy of Sciences are also aimed at creating an information and computing ecosystem to unite researchers processing and analyzing the data obtained. …”
Get full text
Article