Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
1141
Design method of secure computing protocol for deep neural network
Published 2020-08-01“…Aiming at the information leakage problem in the process of deep neural network model calculation,a series of secure and efficient interactive computing protocols were designed between two non-collusive edge servers in combination with the additive secret sharing scheme.Since the nonlinear function cannot be split directly,a set of basic conversion protocols were proposed to realize the secure conversion of additive and multiplicative shares.After a few invokes,the power,comparison,exponential,logarithm,division and other low-level functions can be calculated securely.Due to the characteristics of data transfer and computation,the proposed protocols can be extended to array computation.Theoretical analysis ensures the correctness,efficiency and security of these protocols.The experimental results show that the error of these protocols is negligible,and the computational costs and communication overhead are better than the existing schemes.…”
Get full text
Article -
1142
Metasurface-Based Optical Analog Computing: From Fundamentals to Applications
Published 2022-01-01“…With unprecedented growth in data information over the past few decades, it is critically important to seek a faster and more efficient method to simplify data processing. In recent years, optical analog computing provides an available way due to its large capacity, energy saving, and high efficiency. …”
Get full text
Article -
1143
Building method of distributed COW disk on network computing environment
Published 2012-07-01“…Aiming to distributed computing and data centralizing storage in large-scale network computing environments and combining sparse and bursting characteristic of COW(copy-on-write) disk storing modified data blocks,the distributed COW network disk architecture was presented.The system building process of network computing environments was speeded up by apportioning the aggregation spending that server manages all related COW disks of client hosts to each client host.A improving 64bit bitmap compress arithmetic was designed to reduce the size of COW disk’s bitmap,so server disk space was saved and the network communication spending of distributed COW disk was less.The modified prefetching arithmetic based on COW bursting blocks was presented to improve the hit rate of Cache relating with distributed COW disk.Experiments on the prototype show that the distributed COW mechanism can effectively reduce system building latency of multi-client hosts network computing environment based on improving COW bitmap compress and prefetching arithmetic.…”
Get full text
Article -
1144
Survey on data security and privacy-preserving for the research of edge computing
Published 2018-03-01“…With the rapid development and extensive application of the Internet of things (IoT),big data and 5G network architecture,the massive data generated by the edge equipment of the network and the real-time service requirements are far beyond the capacity if the traditional cloud computing.To solve such dilemma,the edge computing which deploys the cloud services in the edge network has envisioned to be the dominant cloud service paradigm in the era of IoT.Meanwhile,the unique features of edge computing,such as content perception,real-time computing,parallel processing and etc.…”
Get full text
Article -
1145
Construction and optimization of a smart classroom system for emotional computing
Published 2024-06-01“…Finally, through verification, the multiple resources joint optimization method of the smart classroom system can effectively reduce the maximum delay of device data collection and processing, greatly improve the real-time performance of emotional computing in the smart classroom system, and avoid blindly pursuing the minimum average delay, effectively avoiding the situation where a single user experienced poorly due to poor real-time performance. …”
Get full text
Article -
1146
Edge Computing Oriented Certificateless Sorting Ciphertext Retrieval Scheme
Published 2025-05-01“…[Purposes] In order to ensure the privacy and retrievability of cloud data, ciphertext retrieval technology has emerged. However, cloud computing is no longer able to meet the current data processing requirements. …”
Get full text
Article -
1147
Resource Management Across Edge Server in Mobile Edge Computing
Published 2024-01-01“…Mobile Edge Computing (MEC) has the potential to provide computational resources to edge devices. …”
Get full text
Article -
1148
Cloud Computing Services: Benefits, Risks and Intellectual Property Issues
Published 2014-05-01“…Patent strategy of certain proprietary software companies leaded to a veritable “patent war” and “patent arm race” endangering the process of standardization in software industry, especially in cloud computing. …”
Get full text
Article -
1149
Scope for Applications Management in India of Soft Computing in effective Classroom
Published 2022-01-01“…Soft computing has the potential to address the issues.…”
Get full text
Article -
1150
Hybrid quantum and in-memory computing for accelerating solving Simon’s problem
Published 2025-06-01“…While quantum algorithms can exponentially reduce the complexity of Simon’s problem, the overall computational complexity remains O(n3), which is imposed by the process of solving a system of linear equations in modulo 2 arithmetic (Mod-2 LEs). …”
Get full text
Article -
1151
Application of edge computing technology in smart grid data security
Published 2025-02-01“…Absrtact: In order to solve the problem that the two-way flow of power and information between user nodes and service nodes in the smart grid poses a huge threat to the privacy and security of user data, and at the same time, the limitation of the power bureau's computing resources also brings users response delay, service quality degradation and other problems, the author proposes the application of edge computing technology in smart grid data security. …”
Get full text
Article -
1152
NeuroMorse: a temporally structured dataset for neuromorphic computing
Published 2025-01-01“…Neuromorphic engineering aims to advance computing by mimicking the brain’s efficient processing, where data is encoded as asynchronous temporal events. …”
Get full text
Article -
1153
Cognitive Computing with Large Language Models for Student Assessment Feedback
Published 2025-04-01“…While traditional assessment methods emphasise both achievements and development areas, the process remains time-intensive for educators. This research explores the application of cognitive computing, specifically open-source Large Language Models (LLMs) Mistral-7B and CodeLlama-7B, to streamline feedback generation for student reports containing both Python programming elements and English narrative content. …”
Get full text
Article -
1154
Improving Telemedicine through IoT and Cloud Computing: Opportunities and Challenges
Published 2024-09-01“…It explores how IoT-enabled medical devices facilitate continuous remote patient monitoring and real-time health data collection and emphasizes the role of wearable devices comprising smartwatches and fitness trackers in elevating data accuracy and offering personalized health insights. Cloud computing's key role in telemedicine is investigated through its scalable data storage and processing capabilities, which manage the vast amounts of data generated by IoT devices. …”
Get full text
Article -
1155
TREE: Bridging the gap between reconfigurable computing and secure execution
Published 2025-06-01“… Trusted Execution Environments (TEEs) have become a pivotal technology for securing a wide spectrum of security-sensitive applications. With modern computing systems shifting to heterogeneous architectures, integrating TEE support into these systems is paramount. …”
Get full text
Article -
1156
Energy-Accuracy Trade-Offs for Resistive In-Memory Computing Architectures
Published 2024-01-01“…Resistive in-memory computing (IMC) architectures currently lag behind SRAM IMCs and digital accelerators in both energy efficiency and compute density due to their low compute accuracy. …”
Get full text
Article -
1157
Economic and Management Applications of Brain – Computer Interface Technology
Published 2024-12-01“…By processing real-time neural signals, the study explores how BCI can support decision-making processes, automate repetitive tasks, and monitor employees’ cognitive performance. …”
Get full text
Article -
1158
Enhancing Scientific Research and Innovation: The role of the Computer Educator.
Published 2022-12-01“…There is need for expertise in these processes. In this descriptive study, 40 Computer Educators were surveyed and their responses showed that computer educators play a prominent role in the pyramid chain of scientific research and innovation. …”
Get full text
Article -
1159
Material decomposition approaches for monosodium urate (MSU) quantification in gouty arthritis: a (bio)phantom study
Published 2024-11-01Subjects: Get full text
Article -
1160
An unusual case of dens invaginatus on a mandibular second molar: a case report
Published 2025-02-01Subjects: Get full text
Article