Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
13841
-
13842
Research and application of V2X based on MEC
Published 2020-06-01“…The large-scale construction of 5G wireless communication network enhances the development of C-V2X (cellular-vehicle to everything) towards diversified directions.Large bandwidth services,such as high-definition video and AR/VR,bring great transmission and processing pressure to the classical network architecture.Meanwhile,traffic safety services characterized by ultra-high reliability and low delay put stringent requirements on network performance.The network architecture of providing services and computing localization through setting user panel down to close to the terminals and MEC (multiple access edge computing) can meet the requirements of data short loop transmission and ultra-low delay in the internet of vehicles scenario.The combination of MEC and V2X was explored in depth,the MEC networking scenario,MEC network architecture and the key technologies and challenges of MEC were analyzed.The combination scheme of MEC and C-V2X integration of network planning was provided.The application of MEC in C-V2X was presented in several specific scenarios.…”
Get full text
Article -
13843
ARTIFICIAL INTELLIGENCE AS AN OBJECT OF MANAGEMENT: A BENEFIT FOR CIVILISATION OR A THREAT TO MANKIND?
Published 2023-12-01“…Today, artificial intelligence is a global trend in technology development and innovation. Advances in computing power, the ability to collect and process huge amounts of information, and instant access to the latest algorithms are important prerequisites for the evolution of intelligent technologies. …”
Get full text
Article -
13844
Research on the Lightweight of Natural Language Understanding Model in Electric Power Field
Published 2024-12-01“…To address the application requirements of indicator question-and-answer (Q&A) in the electricity industry, this paper researches a natural language understanding model for balancing performance, computing resource consumption, and inference time, and proposes a method to incorporate an early stopping mechanism in the lightweight process of knowledge distillation. …”
Get full text
Article -
13845
Design and Performance Evaluation of an Authentic End-to-End Communication Model on Large-Scale Hybrid IPv4-IPv6 Virtual Networks to Detect MITM Attacks
Published 2024-10-01“…IPv4 and IPv6 protocols will co-exist long during the changeover process. Some attacks, such as MITM attacks, do not discriminate by appearance and affect IPv4 and IPv6 address architectures. …”
Get full text
Article -
13846
Non-Maximum Suppression for Rotated Object Detection During Merging Slices of High-Resolution Images
Published 2024-01-01“…Hence, it is more suitable for computing-constrained mobile platforms such as drones to detect objects on high-resolution images.…”
Get full text
Article -
13847
-
13848
Performance Analysis for the Magnetically Coupled Resonant Wireless Energy Transmission System
Published 2019-01-01Get full text
Article -
13849
From Junk to Genius: Robotic Arms and AI Crafting Creative Designs from Scraps
Published 2024-12-01“…Robotic sorting demonstrated the ability to process up to six foam blocks per minute under controlled conditions. …”
Get full text
Article -
13850
NEURAL NETWORKS OF THE FINAL RING BASED ON THE REDUCTION SCHEME OF THE POSITION-MODULAR-CODE TRANSFORMATION
Published 2018-06-01“…The article studies the problem of creating a neural network of modular computing structures for highperformance expressions in the field of information security. …”
Get full text
Article -
13851
Research on optimization strategies of university ideological and political parenting models under the empowerment of digital intelligence
Published 2025-03-01“…Abstract The development of big data, artificial intelligence, cloud computing, and other new generations of intellectual technologies has triggered digital changes in university civic education’s resources, forms, and modes. …”
Get full text
Article -
13852
Evaluation of Several Machine Learning Models for Field Canal Improvement Project Cost Prediction
Published 2021-01-01“…Due to the massive advancement of soft computing (SC) and Internet of things (IoT), the main research objective of the current study was initiative. …”
Get full text
Article -
13853
A New Cipher Based on Feistel Structure and Chaotic Maps
Published 2019-03-01“…The proposed cipher operates on more than 500 bytes (4000-bit) readable text blocks by six round computing. Within the basic operator of the cipher, i.e., in the function of the round F, a dynamical lookup table 2D standard map system is used to enhance the complexity and diffusion of the unreadable text. …”
Get full text
Article -
13854
Enhancing memory retrieval in generative agents through LLM-trained cross attention networks
Published 2025-05-01Get full text
Article -
13855
Towards the Concurrent Optimization of the Server: A Case Study on Sport Health Simulation
Published 2021-01-01“…As a result, the simulation process is usually time-consuming and simulation efficiency is low. …”
Get full text
Article -
13856
An Online-Traffic-Prediction Based Route Finding Mechanism for Smart City
Published 2015-08-01“…O-Sense firstly exploits a deep learning approach to process spatial and temporal taxi GPS traces shown in dynamic patterns. …”
Get full text
Article -
13857
Visual codon: a user-friendly Python program for viewing and optimizing gene GC content
Published 2024-12-01Get full text
Article -
13858
G-Pre: A Graph-Theory-Based Matrix Preconditioning Algorithm for Finite Element Simulation Solutions
Published 2025-05-01“…In finite element simulation and analysis, increasing simulation scales place high demands on the preconditioning and solution process of linear matrices. However, the most commonly used preconditioning methods for incomplete LU factorization usually increase data access and computation due to data padding and forward/backward operations, as well as affect parallel computing design. …”
Get full text
Article -
13859
Autonomous scheduling mechanism based on energy awareness for improving resource allocation in serverless IoT edge
Published 2025-07-01“…This choice is complex since allocating the necessary resources to process requests depends on the energy available in the active nodes. …”
Get full text
Article -
13860
Deep Reinforcement Learning-Based Resource Allocation for QoE Enhancement in Wireless VR Communications
Published 2025-01-01Get full text
Article