Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
1361
Blockchain-Based Mobile Edge Computing Framework for Secure Therapy Applications
Published 2018-01-01“…Mobile edge computing (MEC) is being introduced and leveraged in many domains, but few studies have addressed MEC for secure in-home therapy management. …”
Get full text
Article -
1362
Edge Computing-Aided Dynamic Wireless Charging and Trip Planning of UAVs
Published 2025-01-01“…To address these issues, this study proposes an integrated system design combining dynamic wireless charging (DWC), intelligent trip planning, and intelligent edge computing (IEC). The proposed system leverages IEC for local data processing to reduce latency and optimize energy management, 6G networks for real-time vehicle-to-infrastructure (V2I) communication, and DWC to enable efficient, on-the-go energy replenishment. …”
Get full text
Article -
1363
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
1364
Meta-heuristic-based offloading task optimization in mobile edge computing
Published 2021-06-01“…With the recent advancements in communication technologies, the realization of computation-intensive applications like virtual/augmented reality, face recognition, and real-time video processing becomes possible at mobile devices. …”
Get full text
Article -
1365
Enhancing Incentive Schemes in Edge Computing through Hierarchical Reinforcement Learning
Published 2025-04-01Get full text
Article -
1366
Quantum Vulnerability Analysis to Guide Robust Quantum Computing System Design
Published 2024-01-01“…While quantum computers provide exciting opportunities for information processing, they currently suffer from noise during computation that is not fully understood. …”
Get full text
Article -
1367
Securing fog computing in healthcare with a zero-trust approach and blockchain
Published 2025-02-01“…Abstract As healthcare systems increasingly adopt fog computing to improve responsiveness and real-time data processing at the edge, significant security challenges emerge due to the decentralized architecture. …”
Get full text
Article -
1368
Computational Grounding: An Overview of Common Ground Applications in Conversational Agents
Published 2021-12-01“…The paper starts with a general description of the theory of grounding. As far as its computational implications are concerned, grounding phenomena are firstly framed in the common grounding processes described in terms of grounding acts. …”
Get full text
Article -
1369
-
1370
COMPUTER SIMULATION OF DISPERSED MATERIALS MOTION IN ROTARY TILTING FURNACES
Published 2016-08-01“…The article presents the results of computer simulation of dispersed materials motion in rotary furnaces with an inclined axis of rotation. …”
Get full text
Article -
1371
Dna-storalator: a computational simulator for DNA data storage
Published 2025-08-01“…Results The DNA-Storalator is a cross-platform software tool that simulates in a simplified digital point of view biological and computational processes involved in the process of storing data in DNA molecules. …”
Get full text
Article -
1372
COMPUTER HYDRODYNAMICS OF THE MELT AND POWDER CARBONIC MATERIALS MIXING IN BOWL
Published 2004-08-01“…The mathematical mechanism for modeling of the mixing processes of melts and powder materials, assumed as a basis of the out-of-furnace steel processing, is presented. …”
Get full text
Article -
1373
Exploring spatial programming through modularity based evolutionary computation
Published 2025-07-01“… The application of evolutionary computing in architecture has advanced beyond active feedback to designers by integrating natural processes with computation to synchronize input from the final solution. …”
Get full text
Article -
1374
Application of computer modeling methods in the design of snow protection systems
Published 2022-09-01“…The numerical algorithm also includes computer processing of meteorological data and a digital model of topography. …”
Get full text
Article -
1375
Impact of decoherence on the fidelity of quantum gates leaving the computational subspace
Published 2025-04-01“…The fidelity of quantum operations is often limited by incoherent errors, which typically can be modeled by fundamental Markovian noise processes such as amplitude damping and dephasing. …”
Get full text
Article -
1376
Architecture of Hardware and Software for Unidirectional Data Transmission in Computer Networks
Published 2023-06-01“…The results of a study of the architecture of hardware and software for unidirectional data transmission in computer networks are presented. The architecture is presented in the form of optical galvanic isolation, media converters and proxy servers, excluding bidirectional data transmission at the hardware level. …”
Get full text
Article -
1377
Computer-assisted diagnosis to improve diagnostic pathology: A review
Published 2025-01-01“…With an increasing demand for accuracy and efficiency in diagnostic pathology, computer-assisted diagnosis (CAD) emerges as a prominent and transformative solution. …”
Get full text
Article -
1378
Design of Carborane Molecular Architectures via Electronic Structure Computations
Published 2009-01-01“…Quantum-mechanical electronic structure computations were employed to explore initial steps towards a comprehensive design of polycarborane architectures through assembly of molecular units. …”
Get full text
Article -
1379
Damage Behaviour of Quasi-Brittle Composites: Mathematical and Computational Aspects
Published 2025-04-01“…Nevertheless, all of the software packages reflect certain compromises between the need for effective computational tools, with parameters obtained from inexpensive experiments, within the possibilities and the complexity of both physical and geometrical descriptions of structure deformation within processes. …”
Get full text
Article -
1380
Computationally Effective Modeling of Cold Rolling: Application to Al Alloys
Published 2024-12-01“…An accurate and numerically efficient description of the rolling process is a challenging task since the degree of computational accuracy is directly related to the complexity of the algorithm employed. …”
Get full text
Article