Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
1581
Authentication and Encryption algorithms for data security in Cloud computing: A comprehensive review
Published 2022-01-01Get full text
Article -
1582
Cyber-physical-social-thinking modeling and computing for geological information service system
Published 2016-11-01“…With the development of computer and Internet service model, it is now possible to obtain rich data and process the data with some advanced computing techniques under network environment. …”
Get full text
Article -
1583
Artificial Intelligence for Unstructured Data Processing
Published 2025-03-01“…Artificial Intelligence (AI) has become an innovative solution in addressing this challenge through techniques such as Natural Language Processing (NLP), Computer Vision, and Machine Learning. …”
Get full text
Article -
1584
A Dual‐Modal Memory Organic Electrochemical Transistor Implementation for Reservoir Computing
Published 2025-01-01“…Neuromorphic computing devices offer promising solutions for next‐generation computing hardware, addressing the high throughput data processing demands of artificial intelligence applications through brain‐mimicking non‐von Neumann architecture. …”
Get full text
Article -
1585
-
1586
Stock volatility as an anomalous diffusion process
Published 2024-12-01“…Our architecture combines convolutional and recurrent neural networks (bidirectional long short-term memory units). Our model computes the diffusion exponent of a financial time series to measure its volatility and it categorizes market movements into five diffusion models: annealed transit time motion (ATTM), continuous time random walk (CTRW), fractional Brownian motion (FBM), Lévy walk (LW), and scaled Brownian motion (SBM).Our findings suggest that the diffusion exponent derived from anomalous diffusion processes provides insightful and novel perspectives on stock market volatility. …”
Get full text
Article -
1587
Optimizing Injection Molding for Propellers with Soft Computing, Fuzzy Evaluation, and Taguchi Method
Published 2024-10-01Get full text
Article -
1588
Optimising complexity and learning for photonic reservoir computing with gain-controlled multimode fibres
Published 2025-08-01“…Within this framework, Reservoir Computing (RC) and Extreme Learning Machines (ELM) are powerful approaches that leverage the dynamics of a complex nonlinear system to process information. …”
Get full text
Article -
1589
Research on distributed multi-access edge computing based on mimic defense theory
Published 2019-09-01“…The highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computing was proposed.By segmenting data,padding check data and processing data at multiple edge node,dynamic scheduling and decision-making functions according to checksum were implemented.The simulation results show that with the increase of delay cost,the data manipulation and leak rates can be reduced effectively by the proposed structure.The edge node scheduling strategy based on trust and cost is proposed to improve the efficiency and security of the system.…”
Get full text
Article -
1590
Research on Migration or Deployment of Telecom Network Management System on Cloud Computing Network
Published 2015-06-01“…Some key problems of system migration or deployment process on cloud computing network were analyzed. …”
Get full text
Article -
1591
Processivity and coupling in messenger RNA transcription.
Published 2010-01-01“…These processes include elongation, which has a minimum time for completion and processing that is not captured in the model.…”
Get full text
Article -
1592
An efficient IoT group association and data sharing mechanism in edge computing paradigm
Published 2023-12-01“…Despite its benefits and promising future, security and privacy challenges for the IoT wireless communication of edge computing environment remain unaddressed. As a result, proper authentication mechanisms are critical, especially in the extreme scenario where some edge facilities are not functional. …”
Get full text
Article -
1593
An FPGA-Based Quantum Computing Emulation Framework Based on Serial-Parallel Architecture
Published 2016-01-01“…Hardware emulation of quantum systems can mimic more efficiently the parallel behaviour of quantum computations, thus allowing higher processing speed-up than software simulations. …”
Get full text
Article -
1594
Quantum Computing and Machine Learning in Medical Decision-Making: A Comprehensive Review
Published 2025-03-01“…Medical decision-making is increasingly integrating quantum computing (QC) and machine learning (ML) to analyze complex datasets, improve diagnostics, and enable personalized treatments. …”
Get full text
Article -
1595
Beamforming and resource optimization in UAV integrated sensing and communication network with edge computing
Published 2023-09-01“…To address the dependence of traditional integrated sensing and communication network mode on ground infrastructure, the unmanned aerial vehicle (UAV) with edge computing server and radar transceiver was proposed to solve the problems of high-power consumption, signal blocking, and coverage blind spots in complex scenarios.Firstly, under the conditions of satisfying the user’s transmission power, radar estimation information rate and task offloading proportion limit, the system energy consumption was minimized by jointly optimizing UAV radar beamforming, computing resource allocation, task offloading, user transmission power, and UAV flight trajectory.Secondly, the non-convex optimization problem was reformulated as a Markov decision process, and the proximal policy optimization method based deep reinforcement learning was used to achieve the optimal solution.Simulation results show that the proposed algorithm has a faster training speed and can reduce the system energy consumption effectively while satisfying the sensing and computing delay requirements.…”
Get full text
Article -
1596
A Microgrid Security Defense Method Based on Cooperation in an Edge-Computing Environment
Published 2023-01-01“…Aiming at the problems of high delay and vulnerable to network attack in the traditional microgrid centralized architecture, a collaborative microgrid security defense method in the edge-computing environment is proposed. First, we build the edge-computing framework for microgrid, deploy the edge-computing server near the equipment terminal to improve the data processing efficiency, and deploy the blockchain in the edge server to ensure the reliability of the system. …”
Get full text
Article -
1597
Verifiable access control scheme based on unpaired CP-ABE in fog computing
Published 2021-08-01“…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
Get full text
Article -
1598
Computing mutual similarity of 3D human faces in nearly linear time.
Published 2025-01-01“…While the algorithms for automated registration (geometrical alignment) and similarity measurement of two facial scans are well-known and used in practice, their direct application for batch processing is limited due to computational requirements. …”
Get full text
Article -
1599
Enhancing healthcare AI stability with edge computing and machine learning for extubation prediction
Published 2025-05-01“…Abstract The advancement of the Internet of Medical Things (IoMT) has revolutionized data acquisition and processing in critical care settings. Given the pivotal role of ventilators, accurately predicting extubation outcomes is essential to optimize patient care. …”
Get full text
Article -
1600
Computing Legal Analysis: A Guided Approach to Problem Solving in Contract Law
Published 2023-11-01“…Computational thinking allows students to visualise connections between the initial categorisation of legal information and the constitutive elements of a persuasive legal argument to articulate and demystify the process of producing legal advice.…”
Get full text
Article