Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
5461
Secure fault-tolerant code for cloud storage
Published 2014-03-01“…A secure regenerating code,called SRCS was proposed to solve the security problem during the process of the fault-tolerant of storage systems,especially the storage system in an extremely open environment such as cloud computing and cloud storage.SRCS achieves the security of the encoding matrix in the regenerating code using the threshold public-key encryption with low redundancy and high efficiency.It is proven that SRCS is secure in the semi-adaptive model using decisional BDHE assumption.…”
Get full text
Article -
5462
Hardware implementation of a configurable and power-efficient current conveyor architecture
Published 2025-09-01Get full text
Article -
5463
Parallel and distributed chimp-optimized LSTM for oil well-log reconstruction in China
Published 2025-07-01“…PDCOA’s primary goal is to speed up the process of hyperparameter tuning for LSTMs by letting them work in parallel and across multiple computers, with separate groups of computers communicating with each other regularly to ensure the system is diverse and reliable. …”
Get full text
Article -
5464
Damage toughness assessment method of power backbone communication network based on power big data
Published 2023-05-01“…The damage toughness assessment method of power backbone communication network based on power big data was studied, and the damage toughness assessment results were used to formulate protection strategies and improve the network survivability.The power backbone communication network and the attacker were set as the two sides of the game, and the Nash equilibrium strategy of both sides was determined by the minimax method.The damage probability of nodes was obtained by the Nash equilibrium strategy, and the node damage probability was transformed into the network damage form.According to the network damage pattern, the repair conditions contained in the power big data were obtained by cloud computing technology.According to the importance of each node, the repair resources and repair budget were allocated to the nodes in order.The performance time-history response curve of the power backbone communication network was constructed, and the dynamic evaluation results of the network damage toughness were output.The experimental results show that all operations using cloud computing technology to process massive power big data can not exceed 330 ms.When the repair budget and repair resources are the highest, the damage toughness of the power backbone communication network can reach 0.925 at most, indicating that this method can effectively evaluate the damage toughness of the power backbone communication network.…”
Get full text
Article -
5465
Damage toughness assessment method of power backbone communication network based on power big data
Published 2023-05-01“…The damage toughness assessment method of power backbone communication network based on power big data was studied, and the damage toughness assessment results were used to formulate protection strategies and improve the network survivability.The power backbone communication network and the attacker were set as the two sides of the game, and the Nash equilibrium strategy of both sides was determined by the minimax method.The damage probability of nodes was obtained by the Nash equilibrium strategy, and the node damage probability was transformed into the network damage form.According to the network damage pattern, the repair conditions contained in the power big data were obtained by cloud computing technology.According to the importance of each node, the repair resources and repair budget were allocated to the nodes in order.The performance time-history response curve of the power backbone communication network was constructed, and the dynamic evaluation results of the network damage toughness were output.The experimental results show that all operations using cloud computing technology to process massive power big data can not exceed 330 ms.When the repair budget and repair resources are the highest, the damage toughness of the power backbone communication network can reach 0.925 at most, indicating that this method can effectively evaluate the damage toughness of the power backbone communication network.…”
Get full text
Article -
5466
Federated deep reinforcement learning-based edge collaborative caching strategy in space-air-ground integrated network
Published 2025-01-01“…To address the problem of limited network coverage in remote areas, combining space-air-ground integrated network with mobile edge computing could provide low-latency and high-reliability transmissions for user requests in these areas, as well as timely caching services. …”
Get full text
Article -
5467
Research on Spaceborne Neural Network Accelerator and Its Fault Tolerance Design
Published 2024-12-01“…This fault-tolerant architecture analyzes the hardware accelerator, parameter storage, and actual computation, employing data validation to reinforce model parameters and spatial and temporal TMR to reinforce accelerator computations. …”
Get full text
Article -
5468
5G defense network using commercial gNodeB with zero trust architecture
Published 2025-06-01Get full text
Article -
5469
Interaction, Artificial Intelligence, and Motivation in Children’s Speech Learning and Rehabilitation Through Digital Games: A Systematic Literature Review
Published 2025-07-01“…This review of the state of the art examines the role of serious games, Artificial Intelligence (AI), and Natural Language Processing (NLP) in speech rehabilitation, with a particular focus on interaction modalities, engagement autonomy, and motivation. …”
Get full text
Article -
5470
Wireless Sensor Networks in Environmental Monitoring Applications Challenges and Future Directions
Published 2025-01-01“…Chivalry: Signal Processing for WMSNs Humanoid vertical lace up boot where the lacing up shoes are made of suede or synthetic leather. …”
Get full text
Article -
5471
DRL-Driven Intelligent SFC Deployment in MEC Workload for Dynamic IoT Networks
Published 2025-07-01“…The framework introduces task offloading and a dynamic resource orchestration strategy, where task offloading to the MEC server ensures an efficient distribution of computation workloads. The dynamic resource orchestration process, Service Function Chaining (SFC) for Virtual Network Functions (VNFs) placement, and routing path determination optimize service execution across the network. …”
Get full text
Article -
5472
ZnO-SnO2/WO3-x heterojunction artificial synapse for realization and integration of multiple biological cognitive functions
Published 2025-01-01“…In current memristor-based neuromorphic computing research, several studies face the challenge of realizing only a single function at a time or having isolated functions. …”
Get full text
Article -
5473
Rétroaction dans les processus numériques de conception
Published 2021-10-01“…The goal is to show that the knowledge embedded by the various computer programs will have led to a real overhaul of design knowledge, as part of the implementation of a new epistemology, driven by digital design processes.…”
Get full text
Article -
5474
-
5475
Dataset Gambar Wajah untuk Analisis Personal Identification
Published 2022-12-01Get full text
Article -
5476
Introducing KeyRing self‐timed microarchitecture and timing‐driven design flow
Published 2021-11-01Get full text
Article -
5477
Listener Acoustic Personalization Challenge - LAP24: Head-Related Transfer Function Upsampling
Published 2025-01-01Get full text
Article -
5478
P-TAME: Explain Any Image Classifier With Trained Perturbations
Published 2025-01-01Get full text
Article -
5479
Max–Min semantic chunking of documents for RAG application
Published 2025-06-01Get full text
Article -
5480
Sparsity‐optimised farrow structure variable fractional delay filter for wideband array
Published 2023-06-01Get full text
Article