Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
4261
Preserving Big Data Privacy in Cloud Environments Based on Homomorphic Encryption and Distributed Clustering
Published 2024-03-01“… Cloud computing has grown in popularity in recent years because to its efficiency, flexibility, scalability, and the services it provides for data storage and processing. …”
Get full text
Article -
4262
NUDIF: A Non-Uniform Deployment Framework for Distributed Inference in Heterogeneous Edge Clusters
Published 2025-04-01“…This optimization minimizes inter-stage processing discrepancies and maximizes resource utilization. …”
Get full text
Article -
4263
FoodSky: A food-oriented large language model that can pass the chef and dietetic examinations
Published 2025-05-01Get full text
Article -
4264
-
4265
Multi-Area, Multi-Service and Multi-Tier Edge-Cloud Continuum Planning
Published 2025-06-01“…The goal is to evaluate the regional deployment of the compute continuum, i.e., the type and number of processing devices, their pairing with a specific tier and task among different areas subject to processing, rate, and latency requirements. …”
Get full text
Article -
4266
CONCEPTUAL FRAMEWORK OF ANALYSIS OF INFORMATION SECURITY MODELS OF CLOUD SYSTEMS OF THE CLASS «INFRASTRUCTURE AS A SERVICE»
Published 2019-10-01“…A process based on the role approach for the synthesis of information security models of cloud computing systems based on applied system and threat models is described; the result is a security model, expressed, for example, in recommendations for improving information security or containing elements of the security configuration. …”
Get full text
Article -
4267
Design of shuffling protocol based on additive secret sharing
Published 2024-08-01Get full text
Article -
4268
Ferroelectric-Based Optoelectronic Synapses for Visual Perception: From Materials to Systems
Published 2025-06-01Get full text
Article -
4269
-
4270
Ion Intercalation‐Mediated MoS2 Conductance Switching for Highly Energy‐Efficient Memristor Synapse
Published 2025-05-01“…Abstract Emerging memristor synapses with ion dynamics have the potential to process spatiotemporal information and can accelerate the development of energy‐efficient neuromorphic computing. …”
Get full text
Article -
4271
Reconsidering big data security and privacy in cloud and mobile cloud systems
Published 2021-09-01“…Secondly, we explore the use of P2P Cloud System (P2PCS) for big data processing and analytics. Thirdly, we propose an efficient hybrid mobile cloud computing model based on cloudlets concept and we apply this model to health care systems as a case study. …”
Get full text
Article -
4272
Progressive filling partitioning and mapping algorithm for Spark based on allocation fitness degree
Published 2017-09-01“…The job execution mechanism of Spark was analyzed,task efficiency model and Shuffle model were established,then allocation fitness degree (AFD) was defined and the optimization goal was put forward.On the basis of the model definition,the progressive filling partitioning and mapping algorithm (PFPM) was proposed.PFPM established the data distribution scheme adapting Reducers’ computing ability to decrease synchronous latency during Shuffle process and increase cluster the computing efficiency.The experiments demonstrate that PFPM could improve the rationality of workload distribution in Shuffle and optimize the execution efficiency of Spark.…”
Get full text
Article -
4273
-
4274
Formal Description of Trusted Bebavior Oriented Security System for Big Data
Published 2014-07-01“…Usually the process of storing and analyzing with big data is under the framework of Hadoop within the environment of cloud computing while the risks of big data application on cloud derive from cloud service providers and remote users who access data without authorization. …”
Get full text
Article -
4275
Enhancing Cloud Resource Management Based on Intelligent System
Published 2024-06-01“…Starting with designing a system based on a genetic algorithm (GA) as a computational tool to achieve the goal and plan a predictive request then depending on the round robin (RR) algorithm to allocate the requests for processing. …”
Get full text
Article -
4276
Energy-efficient optimization strategy based on elastic data migration in big data streaming platform
Published 2024-02-01“…Focused on the problem that the stream computing platform was suffering from the high energy consumption and low efficiency due to the lack of consideration for energy efficiency in designing process, an energy-efficient optimization strategy based on elastic data migration in big data streaming platform (EEDM-BDSP) was proposed.Firstly, models of the load prediction and the resource judgment were set up, and the load prediction algorithm was designed, which predicted the load tendency and determine node resource occupancy, so as to find nodes of resource overload and redundancy.Secondly, models of the resource constraint and the optimal data migration were set up, and the optimal data migration algorithm was proposed, which data migration for the purpose of improving node resource utilization.Finally, model of the energy consumption was set up to calculate the energy consumption saved by the cluster after data migration.The experimental results show that the EEDM-BDSP changes node resources in the cluster can responded on time, the resource utilization and the energy-efficient are improved.…”
Get full text
Article -
4277
Application of machine learning algorithms in economic analysis
Published 2024-05-01“…These tasks require high computational accuracy and large-scale data processing, making classical systems time-consuming and costly. …”
Get full text
Article -
4278
Dynamic Traffic Engineering for Cooperative Fog-Cloud Environment: Trade-off Analysis of Cost and Utilization Under Different Load Conditions
Published 2024-09-01“…Despite its advantages, fog computing faces challenges due to the limited resources (CPU processing capacity, network bandwidth, memory, and power backup) of fog nodes. …”
Get full text
Article -
4279
Understanding the functional roles of modelling components in spiking neural networks
Published 2024-01-01“…Specifically, we find that the leakage plays a crucial role in balancing memory retention and robustness, the reset mechanism is essential for uninterrupted temporal processing and computational efficiency, and the recurrence enriches the capability to model complex dynamics at a cost of robustness degradation. …”
Get full text
Article -
4280
Edge-assisted UAV onboard video compression and transmission for efficient inference of patrolling tasks
Published 2024-12-01“…Due to the limited UAV onboard computational resources, a lightweight RoI extraction method based on class activation mapping (CAM) was proposed, which was able to rapidly locate areas containing patrolling targets. …”
Get full text
Article