Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
1801
Computing ionization free energies of indicator dyes in micelles with fast growth alchemical transformation
Published 2024-06-01Get full text
Article -
1802
CMOS‐Compatible HfOx‐Based Radiation Hardening Component for Neuromorphic Computing Applications
Published 2025-06-01“…Abstract HfOx‐based resistive random‐access‐memory (ReRAM) devices (TiN/Ti/HfOx/RuOx/TiN) are fabricated by CMOS‐compatible materials (ruthenium (Ru)) and lithography‐lite process, potentially enabling a maskless, etching‐free process that can be implemented in the low earth orbit (LEO), the International Space Station (ISS), and commercial LEO destinations (CLDs). …”
Get full text
Article -
1803
Neuromorphic principles for machine olfaction
Published 2025-01-01“…Considering the physical characteristics of turbulent odour environments, we argue that event-driven signal processing is optimally suited to the inherent properties of olfactory signals. …”
Get full text
Article -
1804
SERVICE AND SECURITY MONITORING IN CLOUD
Published 2015-05-01“…In the cloud computing context, Quality of Software (QoS) is defined as the extent to which user requirements are met by the providers of cloud resources. …”
Get full text
Article -
1805
Biomimetic model for computing missing data imputation and inconsistency reduction in pairwise comparisons matrices.
Published 2025-01-01“…A biomimetic model is presented to compute missing data imputation and reduce inconsistencies in pairwise comparisons matrices. …”
Get full text
Article -
1806
-
1807
Trusted computing mobile terminal application research based on biometric trusted access protocol
Published 2017-02-01Get full text
Article -
1808
On the Partial Offloading to Multiple Helpers-Based Task Offloading for IoT Networks
Published 2024-01-01“…By using distributed fog computing, data obtained from sensors can be timely processed and different tasks can be computed efficiently. …”
Get full text
Article -
1809
Assessing the Relevance of Cloud Computing for Micro, Small and Medium Enterprises in the Northern Region of India
Published 2018-01-01“…In such a scenario, cloud computing can be an appropriate option for such MSMEs which are looking for improving their internal processes, enhancing communication with clients and business partners, and extending their market reach through modern ICT solutions with minimum investment and efforts. …”
Get full text
Article -
1810
Polymeric Memristors as Entropy Sources for Probabilistic Bit Generation
Published 2025-04-01“…Abstract Probabilistic bits, or p‐bits, represent a novel computational element that bridges the gap between deterministic classical bits and quantum bits (qubits) used in quantum computing. …”
Get full text
Article -
1811
Soft-computing models for predicting plastic viscosity and interface yield stress of fresh concrete
Published 2025-03-01Get full text
Article -
1812
Physics-Based SPICE-Compatible Compact Model of FLASH Memory With Poly-Si Channel for Computing-in-Memory Applications
Published 2025-01-01“…Moreover, considering recent FLASH memory fabrication processes, we found that grain boundaries in polycrystalline silicon channel materials can be involved in deteriorating gate controllability. …”
Get full text
Article -
1813
Intelligent Photolithography Corrections Using Dimensionality Reductions
Published 2019-01-01“…In this work, we use dimensionality reduction (DR) algorithms to reduce the computation time of complex OPC/EPC problems while the prediction accuracy is maintained. …”
Get full text
Article -
1814
Analog Computing for Nonlinear Shock Tube PDE Models: Test and Measurement of CMOS Chip
Published 2025-01-01“…Driven by observed non-trivial improvements in performance over digital processors while solving linear partial differential equations (PDEs), this paper presents experimental results and analysis from a single-chip CMOS analog computer for solving nonlinear PDEs. …”
Get full text
Article -
1815
Blockchain-based computing and wireless communication resource joint management double auction model
Published 2022-11-01“…In wireless communication networks, the stock of spectrum, computing, storage and other resources at the edge was limited.The traditional decentralized and exclusive resource allocation resulted in weak resource reuse capability and low utilization rate.At the same time, it was difficult to ensure the fairness of resource sharing in the traditional resource scheduling process due to the lack of trust between the owners.First, a double auction model of computing and wireless communication resource joint management based on blockchain was proposed.In the model, a resource market was established, in which resource buyers and sellers allocated resources through double auctions.Secondly, blockchain was used to store the resource information of buyers and sellers to solve the mutual trust problem of all parties in the network.Finally, the experimental simulation was carried out to verify that the proposed model effectively improved the system performance and resource utilization efficiency.…”
Get full text
Article -
1816
Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing
Published 2024-02-01“…To solve the privacy-preserving problem of both the user and the server in indoor positioning, outsourcing part of the calculation to cloud server in the process of using Paillier encryption was considered.The scheme not only protected the privacy of the user and the positioning server, but also avoided excessive computing and communication overhead.The main idea of the scheme was that the fingerprint database in the offline stage was established by the server firstly.The k-anonymity algorithm was combined with Paillier encryption in the online stage by the user, and the encrypted Wi-Fi fingerprints were sent to the positioning server.An aggregation of the received Wi-Fi fingerprints and database fingerprints were performed by the server.Then they were outsourced to the cloud server for decryption and distance calculation by the positioning server.Finally, the positioning result was obtained.Theoretical analysis and experimental results show that the proposed scheme is safe, effective and practical.…”
Get full text
Article -
1817
Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing
Published 2024-02-01“…To solve the privacy-preserving problem of both the user and the server in indoor positioning, outsourcing part of the calculation to cloud server in the process of using Paillier encryption was considered.The scheme not only protected the privacy of the user and the positioning server, but also avoided excessive computing and communication overhead.The main idea of the scheme was that the fingerprint database in the offline stage was established by the server firstly.The k-anonymity algorithm was combined with Paillier encryption in the online stage by the user, and the encrypted Wi-Fi fingerprints were sent to the positioning server.An aggregation of the received Wi-Fi fingerprints and database fingerprints were performed by the server.Then they were outsourced to the cloud server for decryption and distance calculation by the positioning server.Finally, the positioning result was obtained.Theoretical analysis and experimental results show that the proposed scheme is safe, effective and practical.…”
Get full text
Article -
1818
Computing the Matrix G of Multi-Dimensional Markov Chains of M/G/1 Type
Published 2025-04-01“…This study aims to develop an effective algorithm for computing matrices <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mstyle mathvariant="bold" mathsize="normal"><mi>G</mi></mstyle></semantics></math></inline-formula> for <i>M</i>d-M/G/1 processes.…”
Get full text
Article -
1819
Research on secure transport strategy of mobile edge computing based on deep reinforcement learning
Published 2025-04-01“…In mobile edge computing, the process of task unloading will face security problems such as information leakage and eavesdropping. …”
Get full text
Article -
1820
Cloud Computing for Improving Work Efficiency at the Belibi Village Government Office in the Era of Transformation
Published 2025-08-01“…This study aims to describe the implementation process of cloud computing, identify the challenges faced, and formulate strategies to improve work efficiency in the Belibi Village Government Office. …”
Get full text
Article