Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
4581
Distributed trusted demand response bidding mechanism empowered by blockchain
Published 2024-09-01“…In the demand response process involving multi-agent participation, multiple parties’ interests are involved and response execution status supervision is required. …”
Get full text
Article -
4582
Adaptive high frequency data streaming for Soft Real-Time Industrial AI: A scalable microservices based architecture with dynamic downsampling
Published 2025-09-01“…The rapid adoption of Internet of Things (IoT) devices and Edge computing has increased the demand for efficient processing of high-frequency sensor data. …”
Get full text
Article -
4583
Fault Detection and Fault Diagnosis in Power System Using AI: A Review
Published 2024-04-01Get full text
Article -
4584
A retrieval strategy of load balancing optimization scheme for CESM based on matrix nesting
Published 2022-01-01“…The load imbalance between each meteorological sub module and component of CESM makes its computing performance unsatisfactory. It is not realistic to retrieve the optimal layout manually by enumerating parameters because the diversity of available process layout schemes will lead to a huge amount of retrieval. …”
Get full text
Article -
4585
RS-DRL-based offloading policy and UAV trajectory design in F-MEC systems
Published 2025-04-01“…For better flexibility and greater coverage areas, Unmanned Aerial Vehicles (UAVs) have been applied in Flying Mobile Edge Computing (F-MEC) systems to offer offloading services for the User Equipment (UEs). …”
Get full text
Article -
4586
Enabling the Ocean Internet of Things with Renewable Marine Energy
Published 2025-06-01“…The 'thing' is any offshore device which can collect and process data in situ, while the 'internet' represents the medium for transmitting data. …”
Get full text
Article -
4587
Cache Contention Aware Virtual Machine Placement and Mitigation Using Adaptive ABC Algorithm
Published 2025-01-01“…By optimizing the migration process with a focus on these critical factors, it ensures minimal computational overhead and optimal memory performance. …”
Get full text
Article -
4588
Enhancing Desalination Systems with IoT, Solar Energy, and Advanced Sensor Technologies
Published 2025-01-01Get full text
Article -
4589
All-optical combinational logical units featuring fifth-order cascade
Published 2024-12-01“…This innovative design exhibits increased processing speed, improved energy efficiency, robust environmental stability, and high error tolerance, making it exceptionally well-suited for a broad spectrum of applications in optical computing and communications. …”
Get full text
Article -
4590
FQsun: A Configurable Wave Function-Based Quantum Emulator for Power-Efficient Quantum Simulations
Published 2025-01-01“…Quantum computers are promising powerful computers for solving complex problems, but access to real quantum hardware remains limited due to high costs. …”
Get full text
Article -
4591
Reliable, efficient, and scalable photonic inverse design empowered by physics-inspired deep learning
Published 2025-01-01“…On-chip computing metasystems composed of multilayer metamaterials have the potential to become the next-generation computing hardware endowed with light-speed processing ability and low power consumption but are hindered by current design paradigms. …”
Get full text
Article -
4592
Pulscan: Binary Pulsar Detection Using Unmatched Filters on NVIDIA GPUs
Published 2025-01-01“…The computational demands of FDAS and FDJS make them challenging to implement in real-time detection pipelines, requiring costly high-performance computing facilities. …”
Get full text
Article -
4593
Research on distributed data acquisition software for high frame rate area detectors
Published 2024-10-01Get full text
Article -
4594
Cloud-Driven Data Analytics for Growing Plants Indoor
Published 2025-04-01“…The integration of cloud computing, IoT (Internet of Things), and artificial intelligence (AI) is transforming precision agriculture by enabling real-time monitoring, data analytics, and dynamic control of environmental factors. …”
Get full text
Article -
4595
GP4ESP: a hybrid genetic algorithm and particle swarm optimization algorithm for edge server placement
Published 2024-10-01“…In addition, existing algorithms ignored the computing delay of edge servers (ESs) on request process, resulting in overestimation of the service quality. …”
Get full text
Article -
4596
Improved machine classification algorithm for electric rail circuits in train warning systems
Published 2019-12-01Get full text
Article -
4597
Delay and energy minimization for MEC-based secure communication
Published 2020-11-01“…Considering a physical-layer-security-aided confidential document transmission problem,a secure transmission strategy was proposed where the base station equipped with a mobile edge computing (MEC) server served as a relay to help compress,forward,and decompress.First,the Poisson point process was used to calculate the secure transmission probability for the scenario with multiple potential eavesdroppers.Then,a delay and energy minimization problem was formulated under a constraint on the two-hop secure transmission probability.The optimal compression and decompression scheme was obtained using the one-dimensional search combined with linear programming.Simulation results show that the document compression is necessary for the link with small achievable secrecy rate under a given secure transmission probability; otherwise,the document should be directly transmitted without compression.…”
Get full text
Article -
4598
On privacy of property-based remote attestation
Published 2009-01-01“…Remote attestation is an important technique for establishing trust in distributed or network systems and the key part of the trusted computing proposed by TCG.In addition to establishing trust among parties involved in the attesta-tion process, protecting the privacy of participating parties is one of the necessary conditions that remote attestation is widely accepted by stake-holders.Property-based attestation is proposed and a widely accepted scheme for this purpose.However, property-based attestation doesn’t intrinsically preserve the configuration privacy of attestation platform.In fact, the capability of protecting privacy is relevant to the construction of property-based attestation and the measure-ments that the adversary can take to compromise such protection.Three possible measurements were presented that a ma-licious verifier could take to analyze the configuration privacy of the attestation platform.And then the characteristics and limitations of these methods were discussed, which offered reference for the further research on property-based remote attestation.…”
Get full text
Article -
4599
-
4600
On privacy of property-based remote attestation
Published 2009-01-01“…Remote attestation is an important technique for establishing trust in distributed or network systems and the key part of the trusted computing proposed by TCG.In addition to establishing trust among parties involved in the attesta-tion process, protecting the privacy of participating parties is one of the necessary conditions that remote attestation is widely accepted by stake-holders.Property-based attestation is proposed and a widely accepted scheme for this purpose.However, property-based attestation doesn’t intrinsically preserve the configuration privacy of attestation platform.In fact, the capability of protecting privacy is relevant to the construction of property-based attestation and the measure-ments that the adversary can take to compromise such protection.Three possible measurements were presented that a ma-licious verifier could take to analyze the configuration privacy of the attestation platform.And then the characteristics and limitations of these methods were discussed, which offered reference for the further research on property-based remote attestation.…”
Get full text
Article