Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
1281
Research on Resource Pool for Carrierˊs Service Platform Based on Cloud Computing
Published 2013-09-01“…As cloud computing matures, using virtualization technology to build a cloud computing resource pool, carrying on the carrier's service platforms has become an important way for platform integration. …”
Get full text
Article -
1282
Anderson impurity solver integrating tensor network methods with quantum computing
Published 2025-03-01“…Solving the Anderson impurity model typically involves a two-step process, where one first calculates the ground state of the Hamiltonian and then computes its dynamical properties to obtain Green’s function. …”
Get full text
Article -
1283
Efficient Techniques for Solution of Complex Computational Tasks in Building Physics
Published 2019-01-01“…Besides obtaining sufficiently precise results, a significant time-saving is achieved, accounting for more than 99%, while being solved on a single-processor computer.…”
Get full text
Article -
1284
Fog server deployment technique: An approach based on computing resource usage
Published 2019-01-01“…To solve these problems, a new architecture called fog computing has been proposed. Fog computing can process data on a network device close to the user, drastically reducing the bandwidth required from the network and providing near real-time response. …”
Get full text
Article -
1285
Data comparable encryption scheme based on cloud computing in Internet of things
Published 2018-04-01“…The previously proposed short comparable encryption (SCE) scheme can infer the plaintext relationship by comparing the ciphertexts relationship as well as ensuring data security in Internet of things.Unfortunately,it will incur high storage and computational burden during the process of comparing ciphertexts and generating tokens.To this end,an efficient short comparable encryption scheme called SCESW was proposed,which was utilizing the sliding window method with the same size window.Formal security analysis shows that the scheme can guarantee weak indistinguishability in standard model as well as data security and integrity.The experimental results demonstrate that the storage of the SCESW scheme is <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mfrac> <mn>1</mn> <mi>t</mi> </mfrac> <mo stretchy="false">(</mo><mi>t</mi><mi>></mi><mn>1</mn><mo stretchy="false">)</mo></math></inline-formula> times shorter than that of the SCE scheme and the efficiency of the SCESW scheme is superior to that of the SCE scheme.…”
Get full text
Article -
1286
Programmable composite pipeline structure supporting scheduling of integrated network and computing
Published 2025-07-01“…The heterogeneous resource allocation strategy was solved based on resource pricing and cooperative game to realize the flexible scheduling of computing and network resources in the process of data forwarding. …”
Get full text
Article -
1287
Capuchin search algorithm based task scheduling in cloud computing environment
Published 2022-03-01“…Cloud computing is mathematical process that provides more power and flexibility in computing infrastructure. …”
Get full text
Article -
1288
Quantum Computing in Health Care and Dentistry: Transformative Potential, Applications, and Challenges
Published 2025-01-01“…With its ability to process massive datasets and simulate molecular behavior at lightning speed, quantum computing could pave the way for breakthroughs in disease diagnosis, treatment, and drug discovery. …”
Get full text
Article -
1289
Dual system trusted terminal computing architecture based on TPCM RoT
Published 2025-04-01“…The method ensured that the TPCM trusted root chip of the terminal device and the tested basic components were powered on first, completing the trusted measurement of the CPU execution environment, and controlling the CPU power and device initialization configuration, gradually performing trusted diffusion during the computer startup process. It can achieve reliable and trustworthy network applications while ensuring the security and trustworthiness of the device itself, realizing the privacy, security protection, and network security of device data.…”
Get full text
Article -
1290
An Approach to Design and Implement RFID Middleware System over Cloud Computing
Published 2013-10-01“…In view of these objectives and taking especially advantages of virtualization and transparency of Cloud computing, this paper introduces an advanced RFID middleware management system (ARMMS) over Cloud computing, which provides equipment management, RFID tag information management, application level event (ALE) management, and Web service APIs and related functions. …”
Get full text
Article -
1291
Edge computing privacy protection method based on blockchain and federated learning
Published 2021-11-01“…Aiming at the needs of edge computing for data privacy, the correctness of calculation results and the auditability of data processing, a privacy protection method for edge computing based on blockchain and federated learning was proposed, which can realize collaborative training with multiple devices at the edge of the network without a trusted environment and special hardware facilities.The blockchain was used to endow the edge computing with features such as tamper-proof and resistance to single-point-of-failure attacks, and the gradient verification and incentive mechanism were incorporated into the consensus protocol to encourage more local devices to honestly contribute computing power and data to the federated learning.For the potential privacy leakage problems caused by sharing model parameters, an adaptive differential privacy mechanism was designed to protect parameter privacy while reducing the impact of noise on the model accuracy, and moments accountant was used to accurately track the privacy loss during the training process.Experimental results show that the proposed method can resist 30% of poisoning attacks, and can achieve privacy protection with high model accuracy, and is suitable for edge computing scenarios that require high level of security and accuracy.…”
Get full text
Article -
1292
Predicting Carbon Residual in Biomass Wastes Using Soft Computing Techniques
Published 2022-01-01Get full text
Article -
1293
Distributed Optimization for Mobile Robots under Mobile Edge Computing Environment
Published 2021-01-01“…In this respect, mobile edge computing (MEC) technology and millimeter wave (mmW) technology can provide powerful support. …”
Get full text
Article -
1294
Empowering drones in vehicular network through fog computing and blockchain technology.
Published 2025-01-01“…Fog computing was introduced for the Drone with Blockchain Technology (FCDBT) model, where drones collaborate to process IoT data efficiently. …”
Get full text
Article -
1295
A model for aggregation and filtering on encrypted XML streams in fog computing
Published 2017-05-01“…Therefore, the proposed model is a solution to the fog computing applications in which the privacy preservation of sensor data is of great concern.…”
Get full text
Article -
1296
Computing Continuum Simulator: A comprehensive framework for continuum architecture evaluation
Published 2025-05-01“…The Computing Continuum paradigm is essential for meeting the needs of IoT applications that demand real-time processing, reliable connectivity, and low-latency response. …”
Get full text
Article -
1297
Multifunctional Photonic Reservoir Computing Based on Semiconductor Laser With Optical Feedback
Published 2025-01-01“…In this paper, we propose and experimentally demonstrate multifunctional photonic reservoir computing (MPRC), inspired by this biological characteristic. …”
Get full text
Article -
1298
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the &quot;cloud-edge-end&quot; three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
1299
Blockchain-based heterogeneous resource configuration scheme in computing power network
Published 2025-07-01“…Abstract To provide users with on-demand computing and network resources while ensuring service quality, the concept of a computational power network has emerged. …”
Get full text
Article -
1300
Enhancing security in social computing systems through knowledge learning techniques
Published 2025-06-01“…Social computing systems (SCS) integrate social behaviour with computational hardware to enable conversations among technologies and individuals. …”
Get full text
Article