Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
1341
Task Offloading Optimization Using PSO in Fog Computing for the Internet of Drones
Published 2024-12-01“…To address these limits, and to ensure a low task offloading delay, in this paper we propose PSO BS-Fog, a task offloading optimization that combines a particle swarm optimization (PSO) heuristic with fog computing technology for the IoD. The proposed solution applies the PSO for task offloading from unmanned aerial vehicles (UAVs) to fog base stations (FBSs) in order to optimize the offloading delay (transmission delay and fog computing delay) and to guarantee higher storage and processing capacity. …”
Get full text
Article -
1342
SOT-MRAM-based true in-memory computing architecture for approximate multiplication
Published 2025-06-01“…The in-memory computing (IMC) paradigm emerges as an effective solution to break the bottlenecks of conventional von Neumann architecture. …”
Get full text
Article -
1343
RACHEIM: Reinforced Reliable Computing in Cloud by Ensuring Restricted Access Control
Published 2025-06-01“…As the number of service users increases, so does the demand for computational resources, leading data owners to outsource processing tasks to remote cloud servers. …”
Get full text
Article -
1344
Blockchain-Based Mobile Edge Computing Framework for Secure Therapy Applications
Published 2018-01-01“…Mobile edge computing (MEC) is being introduced and leveraged in many domains, but few studies have addressed MEC for secure in-home therapy management. …”
Get full text
Article -
1345
Edge Computing-Aided Dynamic Wireless Charging and Trip Planning of UAVs
Published 2025-01-01“…To address these issues, this study proposes an integrated system design combining dynamic wireless charging (DWC), intelligent trip planning, and intelligent edge computing (IEC). The proposed system leverages IEC for local data processing to reduce latency and optimize energy management, 6G networks for real-time vehicle-to-infrastructure (V2I) communication, and DWC to enable efficient, on-the-go energy replenishment. …”
Get full text
Article -
1346
Meta-heuristic-based offloading task optimization in mobile edge computing
Published 2021-06-01“…With the recent advancements in communication technologies, the realization of computation-intensive applications like virtual/augmented reality, face recognition, and real-time video processing becomes possible at mobile devices. …”
Get full text
Article -
1347
Intelligent computing system construction and application for the human-water relationship discipline
Published 2025-03-01“…The results indicate that the intelligent computing framework holds broad application prospects in five key areas: human-water interaction mechanisms, dynamic processes, simulation and prediction, scientific regulation, and policy formulation. …”
Get full text
Article -
1348
Quantum Vulnerability Analysis to Guide Robust Quantum Computing System Design
Published 2024-01-01“…While quantum computers provide exciting opportunities for information processing, they currently suffer from noise during computation that is not fully understood. …”
Get full text
Article -
1349
Securing fog computing in healthcare with a zero-trust approach and blockchain
Published 2025-02-01“…Abstract As healthcare systems increasingly adopt fog computing to improve responsiveness and real-time data processing at the edge, significant security challenges emerge due to the decentralized architecture. …”
Get full text
Article -
1350
Comparison of radiological and computed tomography results of elbow joint in dogs
“…The elbow joints of the cases were examined by computed tomography (CT).<p> <b>Results:</b> Cranio-caudal radiological view of elbow joint revealed condylus laterale and mediale humerale, olecranon, fossa olecrani, medial and lateral coronoid process. …”
Get full text
Article -
1351
Optimal Design of Vehicle Structure Based on Computer-Aided Technology
Published 2022-01-01“…In order to improve the optimization design effect of modern automobile vehicle structure, this paper combines computer-aided technology to carry out vehicle structure optimization design, introduces the material description of the collision process, expounds the boundary conditions in the collision process, and introduces the theory of explicit integration algorithm. …”
Get full text
Article -
1352
CAD AND CAE METHODS IN COMPUTER ASSISTED DESIGN OF WORM MESHES
Published 2014-03-01“…Modelling of worm meshes with the use of CAD (Computer Aided Design) and CAE (Computer Aided Engineering) methods enables tracking the design process from the very beginning, i.e. from the concept or specific assumptions, until the final stage only by using appropriate software, thereby lowering the costs and eliminating common errors. …”
Get full text
Article -
1353
Proposal of automated computational method to support Virginia tobacco classification
“…It has been verified that the PLS can be applied to this method, as it has a shorter computational time, better suiting a real-time process. …”
Get full text
Article -
1354
-
1355
Influence of study in hee on ubiquity and strength of students’ computer gambling
Published 2016-06-01“…Purpose: to clear up effectiveness of learning-education process for counteraction of students’ harmful passion to computer games’ ubiquity. …”
Get full text
Article -
1356
Optimising roll forming simulation in Abaqus: A computational study
Published 2025-09-01“…Roll forming is a critical manufacturing process due to its complex mechanics and the sequential deformation of metal strips, which pose significant computational challenges. …”
Get full text
Article -
1357
Spatial monitoring of open caissons via computer vision approach
Published 2025-04-01“…Traditional methods such as Electric Level have limitations in providing continuous monitoring throughout the sinking process. To address this challenge, this paper introduces a novel approach utilizing computer vision and linear intensity change model for 3D reconstruction of open caissons and real-time monitoring of the caisson sinking. …”
Get full text
Article -
1358
Mind the Gap: Reconciling Formalism and Intuitionism in Computational Design Research
Published 2014-11-01“…This process is argued to induce a shift in the nature of notations and representations, to which corresponds an epistemic shift from a graphic to a computational rationality, with substantial effects on current design methodologies and strategies used in computational design. …”
Get full text
Article -
1359
Simulating Floquet scrambling circuits on trapped-ion quantum computers
Published 2025-04-01“…Information scrambling refers to such a process whose simulation is one of the promising applications of quantum computing. …”
Get full text
Article -
1360
Generation of a Reconfigurable Logical Cell Using Evolutionary Computation
Published 2013-01-01Get full text
Article