Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
1881
Energy-Efficient Resource Allocation in Mobile Edge Computing Using NOMA and Massive MIMO
Published 2025-01-01“…This work addresses the critical challenge of energy consumption in Mobile Edge Computing (MEC), a burgeoning field that extends cloud computing capabilities to the edge of cellular networks. …”
Get full text
Article -
1882
A Prototype for Computing the Distance of Features of High-Pressure Die-Cast Aluminum Products
Published 2025-04-01“…In response, suppliers must react by improving the flexibility of their means of production and making the changeover process more efficient and agile to avoid monetary losses. …”
Get full text
Article -
1883
An Integrated Node Selection Model Using FAHP and FTOPSIS for Data Retrieval in Ubiquitous Computing
Published 2022-01-01“…Ubiquitous computing (UC) is an advanced computing concept that makes services and computing available everywhere and anytime. …”
Get full text
Article -
1884
APPLICATION OF GPU-CUDA PARALLEL COMPUTING TO THE SMITH-WATERMAN ALGORITHM TO DETECT MUSIC PLAGIARISM
Published 2025-07-01“…Therefore, the innovation raised in this study is to speed up the computing process in detecting music plagiarism by applying parallel computing to the Smith-Waterman algorithm. …”
Get full text
Article -
1885
Computing ionization free energies of indicator dyes in micelles with fast growth alchemical transformation
Published 2024-06-01Get full text
Article -
1886
Secure cloud computing: leveraging GNN and leader K-means for intrusion detection optimization
Published 2024-12-01“…Abstract Over the past two decades, cloud computing has experienced exponential growth, becoming a critical resource for organizations and individuals alike. …”
Get full text
Article -
1887
Optimizing resource allocation in industrial IoT with federated machine learning and edge computing integration
Published 2025-09-01“…The study explores resource allocation in Federated Machine Learning (FedML) for the Industrial Internet of Things (IIoT), focusing on efficient and privacy-conscious data processing. It proposes optimizing the FedML training process to enhance system performance and ensure data privacy. …”
Get full text
Article -
1888
Cloud Computing Resource Scheduling Algorithm Based on Unsampled Collaborative Knowledge Graph Network
Published 2024-01-01“…A cloud computing resource scheduling algorithm based on sampled collaborative knowledge graph network is designed to address the issues of lag in the process of cloud computing resource scheduling, high overall load rate, and large transient amplitude and phase errors. …”
Get full text
Article -
1889
CMOS‐Compatible HfOx‐Based Radiation Hardening Component for Neuromorphic Computing Applications
Published 2025-06-01“…Abstract HfOx‐based resistive random‐access‐memory (ReRAM) devices (TiN/Ti/HfOx/RuOx/TiN) are fabricated by CMOS‐compatible materials (ruthenium (Ru)) and lithography‐lite process, potentially enabling a maskless, etching‐free process that can be implemented in the low earth orbit (LEO), the International Space Station (ISS), and commercial LEO destinations (CLDs). …”
Get full text
Article -
1890
ISEE: Industrial Internet of Things perception in solar cell detection based on edge computing
Published 2021-11-01“…Then it uses the powerful neural network processing unit module of the edge computing unit, combined with the convolutional neural network algorithm transplanted to the edge, to detect the defects of solar panels in real time. …”
Get full text
Article -
1891
Trusted computing mobile terminal application research based on biometric trusted access protocol
Published 2017-02-01Get full text
Article -
1892
Biomimetic model for computing missing data imputation and inconsistency reduction in pairwise comparisons matrices.
Published 2025-01-01“…A biomimetic model is presented to compute missing data imputation and reduce inconsistencies in pairwise comparisons matrices. …”
Get full text
Article -
1893
Reservoir Computing Based on Two Parallel Reservoirs Under Identical Electrical Message Injection
Published 2021-01-01“…In this work, we propose and numerically investigate a scheme for reservoir computing (RC) based on two parallel reservoirs under identical electrical message injection, in which two semiconductor lasers (SLs) under optical feedback are utilized as two parallel reservoirs. …”
Get full text
Article -
1894
Myoelectric signal and machine learning computing in gait pattern recognition for flat fall prediction
Published 2025-03-01Get full text
Article -
1895
Soft-computing models for predicting plastic viscosity and interface yield stress of fresh concrete
Published 2025-03-01Get full text
Article -
1896
Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing
Published 2024-02-01“…To solve the privacy-preserving problem of both the user and the server in indoor positioning, outsourcing part of the calculation to cloud server in the process of using Paillier encryption was considered.The scheme not only protected the privacy of the user and the positioning server, but also avoided excessive computing and communication overhead.The main idea of the scheme was that the fingerprint database in the offline stage was established by the server firstly.The k-anonymity algorithm was combined with Paillier encryption in the online stage by the user, and the encrypted Wi-Fi fingerprints were sent to the positioning server.An aggregation of the received Wi-Fi fingerprints and database fingerprints were performed by the server.Then they were outsourced to the cloud server for decryption and distance calculation by the positioning server.Finally, the positioning result was obtained.Theoretical analysis and experimental results show that the proposed scheme is safe, effective and practical.…”
Get full text
Article -
1897
Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing
Published 2024-02-01“…To solve the privacy-preserving problem of both the user and the server in indoor positioning, outsourcing part of the calculation to cloud server in the process of using Paillier encryption was considered.The scheme not only protected the privacy of the user and the positioning server, but also avoided excessive computing and communication overhead.The main idea of the scheme was that the fingerprint database in the offline stage was established by the server firstly.The k-anonymity algorithm was combined with Paillier encryption in the online stage by the user, and the encrypted Wi-Fi fingerprints were sent to the positioning server.An aggregation of the received Wi-Fi fingerprints and database fingerprints were performed by the server.Then they were outsourced to the cloud server for decryption and distance calculation by the positioning server.Finally, the positioning result was obtained.Theoretical analysis and experimental results show that the proposed scheme is safe, effective and practical.…”
Get full text
Article -
1898
Blockchain-based computing and wireless communication resource joint management double auction model
Published 2022-11-01“…In wireless communication networks, the stock of spectrum, computing, storage and other resources at the edge was limited.The traditional decentralized and exclusive resource allocation resulted in weak resource reuse capability and low utilization rate.At the same time, it was difficult to ensure the fairness of resource sharing in the traditional resource scheduling process due to the lack of trust between the owners.First, a double auction model of computing and wireless communication resource joint management based on blockchain was proposed.In the model, a resource market was established, in which resource buyers and sellers allocated resources through double auctions.Secondly, blockchain was used to store the resource information of buyers and sellers to solve the mutual trust problem of all parties in the network.Finally, the experimental simulation was carried out to verify that the proposed model effectively improved the system performance and resource utilization efficiency.…”
Get full text
Article -
1899
Computing feature matrices using PCA-SVD hybrid method on small-scale systems
Published 2024-12-01“…This paper aims to develop an effective method for reduction and decomposition on large matrices with low required computational resources and fast processing times. Our contribution is to design a PCA-SVD hybrid method that divides the feature extraction into two phases: PCA-based size reduction and SVD-based decomposition. …”
Get full text
Article -
1900
Reservoir Computing for Few-Mode Fiber Channel OSNR Monitoring in Deep Learning Frameworks
Published 2025-01-01“…This paper presents a novel optical performance monitoring (OPM) scheme based on reservoir computing (RC) and Resnet network for monitoring the optical signal-to-noise ratio (OSNR) of few-mode transmission channels, without the need for any demodulation process. …”
Get full text
Article