Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
5321
La écfrasis en el Libro de Alexandre, un proyecto de edición digital para el estudio de la poesía clerical castellana del siglo XIII con minimal computing
Published 2023-08-01“…Secondly, I describe the process of semantic enrichment of the text, the XML-TEI encoding, and the minimal computing approach. …”
Get full text
Article -
5322
System aspects of management technology for scientific and educational services
Published 2017-05-01Get full text
Article -
5323
Multiple-Input Floating-Point Adders: A Comprehensive Review
Published 2025-01-01“…Floating-point addition is pivotal in various computational applications, including scientific computing, machine learning, and graphics processing. …”
Get full text
Article -
5324
Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption
Published 2021-05-01“…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
Get full text
Article -
5325
Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption
Published 2021-05-01“…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
Get full text
Article -
5326
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
Published 2021-01-01“…Aiming at the problem of complex multi-step attack detection, the method of attack scenario construction oriented to cloud computing environment was studied.Firstly, a dynamic probabilistic attack graph model was constructed, and a probabilistic attack graph updating algorithm was designed to make it update periodically with the passage of time and space, so as to adapt to the elastic and dynamic cloud computing environment.Secondly, an attack intention inference algorithm and a maximum probability attack path inference algorithm were designed to solve the uncertain problems such as error and fracture of attack scenarios caused by false positive or false negative, and ensure the accuracy of attack scenario.Meanwhile, the attack scenario was dynamically evolved along with the dynamic probability attack graph to ensure the completeness and freshness of the attack scenario.Experimental results show that the proposed method can adapt to the elastic and dynamic cloud environment, restore the penetration process of attacker’s and reconstruct high-level attack scenario, and so provide certain references for building supervised and accountable cloud environment.…”
Get full text
Article -
5327
Differential privacy protection technology and its application in big data environment
Published 2019-10-01“…The privacy protection in big data is a research hotspot in the field of cyberspace security.As a strict and provable definition of privacy protection,studying application status of differential privacy protection in big data environment can provide reference and guidance for its subsequent system applications.Based on the analysis of the related concepts and technical characteristics of differential privacy protection,the application of differential privacy protection technology was reviewed in data distribution and analysis,cloud computing and big data computing,location and trajectory services and social networks,which expounded the current representative research results and analyzed its existing problems.The research shows that the existing results have made effective innovation and exploration of differential privacy protection applications from the aspects of differential privacy protection mechanism,noise addition mechanism and location,and data processing methods,and the related results have been cross-applied in different scenarios.Finally,four major problems that need to be studied in the further systematic application of differential privacy protection in the big data environment are proposed.…”
Get full text
Article -
5328
Optimized Trust Prediction and Multi-Criteria Framework for Task and Data Collector Selection Using Deep Learning in Ubiquitous Environments
Published 2025-01-01“…In crowdsourcing and ubiquitous computing environments, efficient task assignment and data collector selection are vital for system performance and profitability. …”
Get full text
Article -
5329
Modern trends in the formation of economic and organizational foundations for the construction and development of the digital economy in the Republic of Kazakhstan
Published 2021-03-01“…The assessment of the direct contribution of digitalization processes to the GDP of the Republic of Kazakhstan and economic growth was also carried out. …”
Get full text
Article -
5330
-
5331
-
5332
An all integer-based spiking neural network with dynamic threshold adaptation
Published 2024-12-01“…Due to this all integer-based quantization process, the required computational operations are significantly reduced, potentially providing a substantial energy efficiency advantage for numerous edge computing applications.…”
Get full text
Article -
5333
RON‐based cross‐chain routing optimization strategy in metaverse
Published 2024-12-01Get full text
Article -
5334
Tuning the Resistance of a VO2 Junction by Focused Laser Beam and Atomic Force Microscopy
Published 2025-02-01Get full text
Article -
5335
The Future Is Organic: A Deep Dive into Techniques and Applications for Real-Time Condition Monitoring in SASO Systems—A Systematic Review
Published 2025-06-01“…By analyzing sensor data, CM enables systems to react to dynamic conditions, supporting the core principles of Organic Computing (OC): robustness, adaptability, and autonomy. …”
Get full text
Article -
5336
A Cloud Infrastructure for Health Monitoring in Emergency Response Scenarios
Published 2024-10-01“…Cloud computing provides a solution with its built-in resilience and elasticity capabilities. …”
Get full text
Article -
5337
-
5338
Quantum-enhanced digital twin IoT for efficient healthcare task offloading
Published 2025-05-01“…However, existing Digital Twin (DT)-based healthcare models suffer from high latency, inefficient resource allocation, cybersecurity vulnerabilities, and computational limitations when processing large-scale patient data. …”
Get full text
Article -
5339
The smartHEALTH European Digital Innovation Hub experiences and challenges for accelerating the transformation of public and private organizations within the innovation ecosystem
Published 2024-11-01“…To this end, this paper outlines smartHEALTH’s approach to attracting recipients and providing expert guidance on utilizing state-of-the-art technologies for innovative services, product development, and process creation to accelerate digital transformation.…”
Get full text
Article -
5340