Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
1121
Optimization strategies in NOMA-based vehicle edge computing network
Published 2021-03-01“…Nowadays, vehicular network is confronting the challenges to support ubiquitous connections and vast computation-intensive and delay-sensitive smart service for numerous vehicles.To address these issues, non-orthogonal multiple access (NOMA) and mobile edge computing (MEC) are considered as two promising technologies by letting multiple vehicles to share the same wireless resources, and the powerful edge computing resources were adopted at the edge of vehicular wireless access network respectively.A NOMA-based vehicular edge computing network was studied.Under the condition of guaranteeing task processing delay, the joint optimization problem of task offloading, user clustering, computing resource allocation and transmission power control was proposed to minimize the task processing cost.Since the proposed problem was difficult to solve, it was divided into sub-problems, and a low-complexity and easy-to-implement method was proposed to solve it.The simulation results show that compared with other benchmark algorithms, the proposed algorithm performs well in minimizing costs.…”
Get full text
Article -
1122
Optimization strategies in NOMA-based vehicle edge computing network
Published 2021-03-01“…Nowadays, vehicular network is confronting the challenges to support ubiquitous connections and vast computation-intensive and delay-sensitive smart service for numerous vehicles.To address these issues, non-orthogonal multiple access (NOMA) and mobile edge computing (MEC) are considered as two promising technologies by letting multiple vehicles to share the same wireless resources, and the powerful edge computing resources were adopted at the edge of vehicular wireless access network respectively.A NOMA-based vehicular edge computing network was studied.Under the condition of guaranteeing task processing delay, the joint optimization problem of task offloading, user clustering, computing resource allocation and transmission power control was proposed to minimize the task processing cost.Since the proposed problem was difficult to solve, it was divided into sub-problems, and a low-complexity and easy-to-implement method was proposed to solve it.The simulation results show that compared with other benchmark algorithms, the proposed algorithm performs well in minimizing costs.…”
Get full text
Article -
1123
Cognitive Computing and Business Intelligence Applications in Accounting, Finance and Management
Published 2025-02-01“…Cognitive computing encompasses computing tools and methods that simulate and mimic the process of human thinking, without human supervision. …”
Get full text
Article -
1124
Cloud Computing and AI for Cyberstalking Prevention: A Comprehensive Approach
Published 2025-05-01Get full text
Article -
1125
Integrating Reconfigurable Hardware-Based Grid for High Performance Computing
Published 2015-01-01“…FPGAs have shown several characteristics that make them very attractive for high performance computing (HPC). The impressive speed-up factors that they are able to achieve, the reduced power consumption, and the easiness and flexibility of the design process with fast iterations between consecutive versions are examples of benefits obtained with their use. …”
Get full text
Article -
1126
-
1127
Identification of mental barriers in the implementation of cloud computing in the SMEs in Poland
Published 2014-09-01Get full text
Article -
1128
On the Autotuning Potential of Time-stepping methods from Scientific Computing
Published 2018-09-01Get full text
Article -
1129
Automatic code optimization for computing the McCaskill partition functions
Published 2022-09-01Get full text
Article -
1130
Comparing Performance of Machine Learning Libraries across Computing Platforms
Published 2023-09-01Get full text
Article -
1131
An Autonomous Planning Model for Deploying IoT Services In Fog Computing
Published 2024-02-01“…Therefore, processing, analysis and storage are closer to the source of data and end users cause the delay is reduced. …”
Get full text
Article -
1132
Flash Memory for Synaptic Plasticity in Neuromorphic Computing: A Review
Published 2025-02-01“…These devices enable in-memory computing, helping to overcome the “von Neumann bottleneck”, a limitation caused by the separation of memory and processing units in traditional von Neumann architecture. …”
Get full text
Article -
1133
Authorization delegation mechanism based trust level in grid computing
Published 2008-01-01“…To meet the demand of the delegation service during multi-domain authorization in grid computing,the dele-gation negotiation process is presented to realize the authorization delegation of role and permission based on the RBDM and RT model through the introduction of trust levels.The fine-grain authorization delegation policy is given.Finally,the simulation is given to prove the feasibility of the delegation model with trust level.…”
Get full text
Article -
1134
Diffluent Internet Traffic and Characteristics Computation Based on Hadoop
Published 2014-12-01“…In order to solve the problems of poor expansibility and high cost that caused by the traditional stand-alone, an internet traffic characteristics analysis method based on MapReduce, which parallel processes diffluent internet traffic and characteristics computing, was proposed. …”
Get full text
Article -
1135
Multitask Analysis Method for Tongue Image Based on Edge Computing
Published 2025-01-01“…Additionally, the model exhibits advantages in terms of quantity and scale, saving both storage and computational resources. It not only enhances the accuracy and efficiency of tongue image real-time analysis in edge computing scenarios but also reduces the processing time, providing excellent precision and inference speed.…”
Get full text
Article -
1136
Virtualization Security, Key Issues of Public Cloud Computing Security
Published 2015-12-01“…With the prosperous development of information technologies and popularity of information-based on a global basis, public application and service of cloud computing has become a trend and inevitable part of enterprise growth.Only an enterprise is speeding up the process,which is playing an increasingly important role in the enterprise growth. …”
Get full text
Article -
1137
New cross-layer reputation mechanism for mobile cloud computing
Published 2018-03-01“…Users are facing increasingly serious security threats such as data leakage and privacy exposure while using various mobile cloud services.Based on the data security and privacy protection for mobile cloud computing research background,combining the cross-layer design and credit mechanism,in the node between the introduction of the MAC layer and network layer in the process of credit evaluation of factors affecting user reputation,to identify and manage internal malicious nodes.The credibility of the simulation results show that the proposed mechanism can effectively resist the internal defamation and multilayer attack,enhance the credibility of mobile terminals,thus improve the mobile cloud service data security and privacy protection.…”
Get full text
Article -
1138
Technology development mode of communication/sensing/computing/intelligence integration
Published 2022-03-01“…Various new functions and services related to communication/sensing/computing/intelligence have been targeted, developed and fused into the existing 5G-Advanced and emerging 6G new system.The technical scenarios and use cases of communication/sensing/computing/intelligence integration and its expectation for technique mode requirementin 5G-Advanced and 6G different phases were addressed, meanwhile five characteristics of its technology development mode were extracted.The proposed viewpoints may guide the research and development of 5G-Advanced system and standardization process of 6G new system in future, leading to more effective and profitable applications and maximization of business value from communication/sensing/computing/intelligence integration.…”
Get full text
Article -
1139
NOMA enable network optimization scheme of mobile edge computing
Published 2022-04-01“…Mobile edge computing(MEC) enables an intelligent terminal to transfer part of the computing load to the edge server located in the base station subsystem to solve the problem of mass data processing in IoT network. …”
Get full text
Article -
1140
Design and Research of Photonic Reservoir Computing for Optical Channel Equalization
Published 2025-04-01“…These architectures leverage optical computing instead of electrical computing to reduce computational pressure at the receiver and decrease processing latency. …”
Get full text
Article