Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
2221
Hardware realization of neuromorphic computing with a 4–port photonic reservoir for modulation format identification
Published 2025-01-01“…The fields of machine learning and artificial intelligence drive researchers to explore energy-efficient, brain-inspired new hardware. Reservoir computing encompasses recurrent neural networks for sequential data processing and matches the performance of other recurrent networks with less training and lower costs. …”
Get full text
Article -
2222
Multiple viewpoints projection hologram from multiple angular orthogonal projection images based on GPU
Published 2024-09-01Subjects: “…information processing technology…”
Get full text
Article -
2223
An open source FEM code for solving coupled thermo-poroelastoplastic processes
Published 2024-06-01“… Coupled thermo-hydro-mechanical (THM) processes are ubiquitous in subsurface energy production and geological utilization and storage operations. …”
Get full text
Article -
2224
In-Memory Versus Disk-Based Computing with Random Forest for Stock Analysis: A Comparative Study
Published 2025-08-01“…As data become increasingly large, diverse and fast-moving, conventional processing systems often fall short of the performance required for modern analytics.Objective: This research seeks to thoroughly assess the performance of two prominent big data processing frameworks-Apache Spark (in-memory computing) and MapReduce (disk-based computing)-with a focus on applying random forest algorithms to predict stock prices. …”
Get full text
Article -
2225
Analisis Kinerja Jaringan Sensor Nirkabel untuk Edge Computing Menggunakan LORA SX1278
Published 2021-10-01“…The sensing process can be done by using various sensors as needed, while the technology for processing the sensing node is called Edge Computing technology. …”
Get full text
Article -
2226
A Bayesian Network under Strict Chain Model for Computing Flow Risks in Smart City
Published 2020-01-01Get full text
Article -
2227
Integrated Photonics for IoT, RoF, and Distributed Fog–Cloud Computing: A Comprehensive Review
Published 2025-07-01“…Integrated photonics is a transformative technology for enhancing communication and computation in Cloud and Fog computing networks. Photonic integrated circuits (PICs) enable significant improvements in data-processing speed, energy-efficiency, scalability, and latency. …”
Get full text
Article -
2228
Quantum Computing Approach in K-Medoids Method for AIDS Disease Prediction Using Manhattan Distance
Published 2025-04-01“…The Manhattan distance is used because it is easier to process data. The quantum computing approach is used to overcome the limitations of classical computing when processing large-scale medical data. …”
Get full text
Article -
2229
Real-time human-robot interaction and service provision using hybrid intelligent computing framework.
Published 2025-01-01“…This research introduces a Hybrid Intelligent Computing Model (HICM) to improve robots' ability to process inquiries autonomously. …”
Get full text
Article -
2230
Stage-based colorectal cancer prediction on uncertain dataset using rough computing and LSTM models
Published 2024-11-01“…Abstract Artificial intelligence (AI) is an attractive field of Computer Science that helps to classify and to predict various real-time applications. …”
Get full text
Article -
2231
Research on intrusion response strategy based on static Bayesian game in mobile edge computing network
Published 2023-02-01“…In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion detection network structure suitable for mobile edge computing environment was proposed and an intrusion response decision model based on static Bayesian game was established to simulate the network interaction behavior between edge nodes and external intruders.The probability of attackers and defenders in the game process was predicted respectively.The influence of the system resource, the cost of intrusion response, the detection rate and false alarm rate were considered comprehensively by the intrusion response decision model.The response decision of the intrusion detection system was optimized on the basis of the considering both resource consumption of the intrusion detection and the privacy protection of the edge nodes.The factors that affected the decision-making of intrusion response were analyzed, and the experimental basis for the specific application was provided.…”
Get full text
Article -
2232
Sustainable AI With Quantum-Inspired Optimization: Enabling End-to-End Automation in Cloud-Edge Computing
Published 2025-01-01“…This article explores the integration of quantum computing and end-to-end automation strategies in cloud-edge architectures. …”
Get full text
Article -
2233
Intelligent data analysis in edge computing with large language models: applications, challenges, and future directions
Published 2025-05-01“…Edge computing has emerged as a vital paradigm for processing data near its source, significantly reducing latency and improving data privacy. …”
Get full text
Article -
2234
Research on cloud computing users’ public safety trust model based on scorecard-random forest
Published 2018-05-01“…Traditional cloud computing trust models mainly focused on the calculation of the trust of users’ behavior.In the process of classification and evaluation,there were some problems such as ignorance of content security and lack of trust division verification.Aiming to solve these problems,cloud computing users’ public safety trust model based on scorecard-random forest was proposed.Firstly,the text was processed using Word2Vec in the data preprocessing stage.The convolution neural network (CNN) was used to extract the sentence features for user content tag classification.Then,scorecard method was used to filter the strong correlation index.Meanwhile,in order to establish the users’ public safety trust evaluation model in cloud computing,a random forest method was applied.Experimental results show that the proposed users’ public safety trust evaluation model outperforms the general trust evaluation model.The proposed model can effectively distinguish malicious users from normal users,and it can improve the efficiency of the cloud computing users management.…”
Get full text
Article -
2235
Research on intrusion response strategy based on static Bayesian game in mobile edge computing network
Published 2023-02-01“…In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion detection network structure suitable for mobile edge computing environment was proposed and an intrusion response decision model based on static Bayesian game was established to simulate the network interaction behavior between edge nodes and external intruders.The probability of attackers and defenders in the game process was predicted respectively.The influence of the system resource, the cost of intrusion response, the detection rate and false alarm rate were considered comprehensively by the intrusion response decision model.The response decision of the intrusion detection system was optimized on the basis of the considering both resource consumption of the intrusion detection and the privacy protection of the edge nodes.The factors that affected the decision-making of intrusion response were analyzed, and the experimental basis for the specific application was provided.…”
Get full text
Article -
2236
Synthetic biology meets neuromorphic computing: towards a bio-inspired olfactory perception system
Published 2025-01-01“…We argue that a co-design approach offers significant advantages in replicating the complex dynamics of odor sensing and processing. We propose a hybrid system of synthetic sensory neurons that provides three key features: (a) receptor-gated ion channels, (b) interface between synthetic biology and semiconductors and (c) event-based encoding and computing based on spiking networks. …”
Get full text
Article -
2237
Granular computing-driven two-stage consensus model for large-scale group decision-making
Published 2025-06-01Get full text
Article -
2238
Real-Time Bio-Inspired Polarization Heading Resolution System Based on ZYNQ Heterogeneous Computing
Published 2025-04-01Get full text
Article -
2239
Real-time monitoring and optimization methods for user-side energy management based on edge computing
Published 2025-07-01“…Abstract This paper presents a comprehensive framework for real-time monitoring and optimization of user-side energy management systems leveraging edge computing technology. The proposed approach addresses key challenges in traditional centralized energy management by bringing computation and data processing closer to end devices. …”
Get full text
Article -
2240
A simple algorithm for computing a multi-dimensional the Sierpiński space-filling curve generalization
Published 2023-10-01Get full text
Article