Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
1301
Increasing the Quality of Transient Processes in the Vehicle Transmission
Published 2019-12-01“…By employing simulation models a number of methods were used to regulate power redistribution. Results of computations made it possible to determine that the efficiency of power redistribution are closely related to initial conditions of the process under the study. …”
Get full text
Article -
1302
Management accounting and analysis of business processes in the enterprise
Published 2018-08-01“…The article considers the main problems of managerial accounting and analysis of business processes in the field of manufacturing sector (industry, construction, agriculture). …”
Get full text
Article -
1303
Anderson impurity solver integrating tensor network methods with quantum computing
Published 2025-03-01“…Solving the Anderson impurity model typically involves a two-step process, where one first calculates the ground state of the Hamiltonian and then computes its dynamical properties to obtain Green’s function. …”
Get full text
Article -
1304
THE COMPUTER-AIDED CONTROLLING OF TECHNICAL AND TECHNOLOGICAL PLANTS IN THE WAVELET MEDIUM
Published 2015-03-01“…Dosing processes in mixture producing aggregates for receiving dry dispersed compositions of various kinds are considered as a research plant. …”
Get full text
Article -
1305
Software analysis of scientific texts: comparative study of distributed computing frameworks
Published 2025-05-01“…This study aims to conduct a study of popular distributed computing frameworks for scientific text processing. …”
Get full text
Article -
1306
Fog computing based radio access networks:architecture,principles and challenges
Published 2016-06-01“…To reduce the burden of fronthaul link,avoid large-scale wireless signal processing in centralized baseband unit(BBU)pool,and take full advantage of processing and storage capabilities in edge devices,a fog computing based radio access network(F-RAN)was presented as an evolution form of heterogeneous cloud radio access networks.The core idea of F-RAN was to take full advantage of processing and storage capabilities in edge devices which could achieve the local distributed content delivery,the local distributed collaboration radio signal processing and the local distributed cooperative radio resource management functions.System architectures of F-RAN,promising key techniques,and researching open issues of F-RAN were discussed in detail.…”
Get full text
Article -
1307
A comparison of computational models for eukaryotic cell shape and motility.
Published 2012-01-01“…In this review, we describe some of the recent computational models for cell motility, concentrating on simulations of cell shape changes (mainly in two but also three dimensions). …”
Get full text
Article -
1308
Development and application of distributed computing system in inverse problems of fracture mechanics
Published 2017-12-01“…The availability of the high-quality high-speed network is desirable. This simplifies the process of the system deployment, and increases the productivity of the computing process. …”
Get full text
Article -
1309
Investigation of the Effectiveness of Programs Optimization Methods for Parallel Computing Systems with GPU
Published 2024-01-01“…This task finds its application in various fields from signal and image processing to artificial intelligence systems. Parallel computing systems equipped with GPU are chosen as the target computing architecture. …”
Get full text
Article -
1310
Multiobjective Offloading Optimization in Fog Computing Using Deep Reinforcement Learning
Published 2024-01-01“…Edge computing allows IoT tasks to be processed by devices with passive processing capacity at the network’s edge and near IoT devices instead of being sent to cloud servers. …”
Get full text
Article -
1311
Computing Continuum Simulator: A comprehensive framework for continuum architecture evaluation
Published 2025-05-01“…The Computing Continuum paradigm is essential for meeting the needs of IoT applications that demand real-time processing, reliable connectivity, and low-latency response. …”
Get full text
Article -
1312
Edge Computing for Real-Time Climate Data Analysis in Smart Farming
Published 2025-01-01“…The results shows 35% saved data processing latency and 92% of the prediction accuracy in climate conditions and anomalies. …”
Get full text
Article -
1313
Collaborative Optimization Strategy for Dependent Task Offloading in Vehicular Edge Computing
Published 2024-12-01“…This paper proposes a task-offloading scheme based on deep reinforcement learning to optimize the strategy between vehicles and edge computing resources. The task-offloading problem is modeled as a Markov Decision Process, and an improved twin-delayed deep deterministic policy gradient algorithm, LT-TD3, is introduced to enhance the decision-making process. …”
Get full text
Article -
1314
Federated learning based intelligent edge computing technique for video surveillance
Published 2020-10-01“…With the explosion of global data,centralized cloud computing cannot provide low-latency,high-efficiency video surveillance services.A distributed edge computing model was proposed,which directly processed video data at the edge node to reduce the transmission pressure of the network,eased the computational burden of the central cloud server,and reduced the processing delay of the video surveillance system.Combined with the federated learning algorithm,a lightweight neural network was used,which trained in different scenarios and deployed on edge devices with limited computing power.Experimental results show that,compared with the general neural network model,the detection accuracy of the proposed method is improved by 18%,and the model training time is reduced.…”
Get full text
Article -
1315
Comparative analysis of computing platforms for onboard micromodule of provisional image recognition
Published 2018-09-01“…The information provided in this paper could be useful for engineers and researchers who are developing compact budget mobile systems for processing, analyzing and recognition of images.…”
Get full text
Article -
1316
A Security Monitoring Method Based on Autonomic Computing for the Cloud Platform
Published 2018-01-01“…To protect data, data monitoring is a necessary process. Based on autonomic computing, we develop a cloud data monitoring system on the cloud platform, monitoring whether the data is abnormal in the cycle and analyzing the security of the data according to the monitored results. …”
Get full text
Article -
1317
An Approach to Design and Implement RFID Middleware System over Cloud Computing
Published 2013-10-01“…In view of these objectives and taking especially advantages of virtualization and transparency of Cloud computing, this paper introduces an advanced RFID middleware management system (ARMMS) over Cloud computing, which provides equipment management, RFID tag information management, application level event (ALE) management, and Web service APIs and related functions. …”
Get full text
Article -
1318
Edge computing privacy protection method based on blockchain and federated learning
Published 2021-11-01“…Aiming at the needs of edge computing for data privacy, the correctness of calculation results and the auditability of data processing, a privacy protection method for edge computing based on blockchain and federated learning was proposed, which can realize collaborative training with multiple devices at the edge of the network without a trusted environment and special hardware facilities.The blockchain was used to endow the edge computing with features such as tamper-proof and resistance to single-point-of-failure attacks, and the gradient verification and incentive mechanism were incorporated into the consensus protocol to encourage more local devices to honestly contribute computing power and data to the federated learning.For the potential privacy leakage problems caused by sharing model parameters, an adaptive differential privacy mechanism was designed to protect parameter privacy while reducing the impact of noise on the model accuracy, and moments accountant was used to accurately track the privacy loss during the training process.Experimental results show that the proposed method can resist 30% of poisoning attacks, and can achieve privacy protection with high model accuracy, and is suitable for edge computing scenarios that require high level of security and accuracy.…”
Get full text
Article -
1319
Real-Time Threat Mitigation in Financial IT Infrastructures Using Quantum Computing
Published 2025-06-01“…Quantum computing promises an unmatched level of scalable parallel processing with increased accuracy, speed, and timely response to realtime threats. …”
Get full text
Article -
1320
Parallel cache-efficient code for computing the McCaskill partition functions
Published 2019-09-01Get full text
Article