Showing 61 - 79 results of 79 for search 'Cache (computing)', query time: 0.05s Refine Results
  1. 61

    Reinforcement learning based group key agreement scheme with reduced latency for VANET by Tangwei1 XU, Hailu ZHANG, Chuhuan LIU, Liang XIAO, Zhenmin ZHU

    Published 2020-10-01
    “…Key agreement scheme of vehicle ad hoc networks (VANET) determines the privacy and security against user identity-based attacks,such as spoofing attack.The existing work updates the group shared key at a fixed frequency,which increases the processing latency of the key updates and the encryption and decryption of group communication.A reinforcement learning based dynamic key agreement scheme was proposed to enable the group cluster head to optimize the key update frequency and key length.This scheme optimizes the calculation latency of encryption and decryption based on the number of surrounding vehicles,the previous key update records without the knowledge of the traffic flow model and the access-driven cache attack model.Simulation results show that this scheme reduces the transmission delay of the communication overhead and the computational latency of encryption and decryption,and improves the security of the group key compared with the benchmark scheme.…”
    Get full text
    Article
  2. 62

    Retracted: Cloud Network and Mathematical Model Calculation Scheme for Dynamic Big Data by Yiren Chen, Zhiyong Qiu

    Published 2020-01-01
    “…After analysis, the obtained results are actively cached on the fog computing device and compared with the data of the telecommunication network detection terminal on the fog device. …”
    Get full text
    Article
  3. 63

    Selecting the Best Routing Traffic for Packets in LAN via Machine Learning to Achieve the Best Strategy by Bo Zhang, Rongji Liao

    Published 2021-01-01
    “…The application of machine learning touches all activities of human behavior such as computer network and routing packets in LAN. In the field of our research here, emphasis was placed on extracting weights that would affect the speed of the network's response and finding the best path, such as the number of nodes in the path and the congestion on each path, in addition to the cache used for each node. …”
    Get full text
    Article
  4. 64

    Intelligent Scheduling Method Supporting Stadium Sharing by Lei Fang

    Published 2021-01-01
    “…When using edge computing (EC) technology for service calculation, the mobile terminal needs to offload the service to the edge computing server. …”
    Get full text
    Article
  5. 65

    Real-Time Cyber-Physical Digital Twin for Low Earth Orbit Satellite Constellation Network Enhanced Wide-Area Power Grid by Tianshi Cheng, Tong Duan, Venkata Dinavahi

    Published 2024-01-01
    “…It features a data-centric design using an ECS framework with a structure-of-arrays memory layout, optimizing cache efficiency and computational performance, and offers high extensibility for interdisciplinary simulations. …”
    Get full text
    Article
  6. 66

    A Study of an IT-Assisted Higher Education Model Based on Distributed Hardware-Assisted Tracking Intervention by Haijun Liu

    Published 2022-01-01
    “…The MEC-based dynamic adaptive video stream caching technology model is proposed. The model dynamically adjusts the bit rate by referring to the broadband estimation and cache occupancy data to ensure users have a smooth experience effect. …”
    Get full text
    Article
  7. 67

    Edge-cloud collaboration empowered immersive Web3D by XU Yanan, ZHAO Guidan, FENG Daquan, SHI Wenzhe, LU Ping

    Published 2024-09-01
    “…Focusing on the application of edge-cloud collaboration frameworks in immersive Web3D services, how this computing mode tackle the intricate issues encountered in establishing Web3D platforms was discussed. …”
    Get full text
    Article
  8. 68

    Deep reinforcement learning to enhance the energy-efficient performance of UAV-enabled F-RAN by Haibo MEI, Kun YANG, Xinyu FAN

    Published 2021-06-01
    “…Fog radio access network (F-RAN) is suitable for Internet of things applications of national important industries, such as pipeline network monitoring in wide area.However, the performance of the F-RAN based on the territorial fog access point will be affected greatly by the complicated territorial environment.This causes F-RAN not able to provide fog access service in a timely and effectively manner.To this problem, the research was proposed to utilize low altitude UAV as the fog access point to realize air ground edge communication and fog computing, which has attracted enormous research interests.How to use deep reinforcement learning (DRL) to improve the energy efficiency of UAV fog access point and extend the mission time of UAV were discussed.Deep reinforcement learning can ensure the UAV fog access point to adjust the configuration strategy timely of air ground communication and computing, including resource optimization, dynamic task offloading and caching.DRL can also optimize the UAV trajectory in 3-D space, and improve the overall performance of UAV enabled fog access network.The innovation of the research lies in the comprehensive discussion of the main optimization problems to be solved in the UAV-enabled F-RAN using DRL.The technical details were also summarized to solve the related optimization problems.Finally, the technical challenges and future research directions of the application of DRL in the UAV-enabled F-RAN were discussed.…”
    Get full text
    Article
  9. 69

    Wireless edge intelligence empowers smart society by Zhi WANG, Xing ZHANG, Wenbo WANG

    Published 2019-03-01
    “…To satisfy the technical requirements of eMBB,mMTC and uRLLC in 5G application scenarios,wireless edge intelligence sinks core capabilities of computing,caching and network to the edge of radio access network,as well as introduces technologies such as deep learning/artificial intelligence into the edge cloud,thereby enabling digital life,digital society and digital industry.Firstly,the concept,challenges and opportunities of wireless edge intelligence were clarified.Moreover,the platform deployment of wireless edge intelligence was analyzed.Finally,the possible future deployment directions of wireless edge intelligence were discussed.…”
    Get full text
    Article
  10. 70

    Neuroeconomically dissociable forms of mental accounting are altered in a mouse model of diabetes by Chinonso A. Nwakama, Romain Durand-de Cuttoli, Zainab M. Oketokoun, Samantha O. Brown, Jillian E. Haller, Adriana Méndez, Mohammad Jodeiri Farshbaf, Y. Zoe Cho, Sanjana Ahmed, Sophia Leng, Jessica L. Ables, Brian M. Sweis

    Published 2025-01-01
    “…These foraging behaviors were driven by impairments in multiple decision-making processes, including the ability to deliberate when engaged in conflict and cache the value of the passage of time as sunk costs. …”
    Get full text
    Article
  11. 71

    An Online Interactive Experiment Management System for CMA Numerical Weather Prediction Models by Wang Bin, Hu Jiangkai, Cui Yingjie, Zhou Bin, Sun Jing, Zhao Chunyan, Lou Panxing

    Published 2025-01-01
    “…The resource layer provides foundational support in terms of computing power, data, and code. The system offers functions for template editing, process arrangement, and instance construction, facilitating the flexible and rapid design of model experiments. …”
    Get full text
    Article
  12. 72

    Efficient resource allocation with context-awareness for parked car road side unit-based Internet of vehicles by Peng QIN, Haoting HE, Xiongwen ZHAO, Yang FU, Yu ZHANG, Miao WANG, Shuo WANG, Xue WU

    Published 2022-07-01
    “…In order to reduce the number of road side unit (RSU) and meet the needs of mobile vehicle users for processing latency-sensitive and computation-intensive tasks, a context-aware resource allocation algorithm was proposed based on parked cars.Road side parked vehicles were selected to serve the vehicle users instead of RSU using parking time as a factor for determining whether a parked vehicle could become a parked car roadside unit (PCRSU).In order to further reduce the system response time, a mechanism was designed considering content caching and distribution.In respect to user content caching, PCRSU made personalized content recommendation for vehicle users with awareness by using two elements of user historical search data and point of interest (PoI) area type.In respect to content distribution, PCRSU allocated bandwidth efficiently by sensing the data transmission needs of vehicle users.Extensive experiments show that compared with the existing benchmark methods, the proposed algorithm can select PCRSU more reasonably, effectively reduce the demand response delay, improve the stability of the network while ensuring network coverage, and provide more accurate service content for vehicle users.…”
    Get full text
    Article
  13. 73
  14. 74

    Research on new frameworks and key technologies for intelligent emergency command communication networks by Li WANG, Aiguo FEI, Ping ZHANG, Lianming XU

    Published 2023-06-01
    “…The new generation of emergency command communication network is the basic means and important support for enhancing China’s emergency response capabilities such as national natural disasters and accidents, and is a key component of establishing a scientific emergency management technology system.Focusing on the requirements of communication, navigating, and sensing capabilities in “intelligent emergency”, a theoretical method and framework for intelligent emergency command and communication networks was proposed, which was introduced from three aspects in terms of network deployment, resource allocation, and assisted decision-making.The difficulties and technical ideas of multi-objective dynamic network deployment for communication, navigating, and sensing, multi-dimension efficient resource allocation for communication, computation, and caching, and multi-level decision-making and intelligent enhancement with cloud-edge-terminal collaboration were analyzed and discussed.It provides theoretical methods and key technical supports for building a new generation of emergency command and communication network in China.…”
    Get full text
    Article
  15. 75

    New blocked all-pairs shortest paths algorithms operating on blocks of unequal sizes by A. A. Prihozhy, O. N. Karasik

    Published 2024-01-01
    “…A new heterogeneous algorithm can significantly reduce the computation time of blocks depending on the block type and size. …”
    Get full text
    Article
  16. 76

    Lightweight anomaly detection model for UAV networks based on memory-enhanced autoencoders by HU Tianzhu, SHEN Yulong, REN Baoquan, HE Ji, LIU Chengliang, LI Hongjun

    Published 2024-04-01
    “…The message queue based on the operating system was used for data packet caching to achieve persistent processing of high-speed data streams, which effectively improved the stability and reliability of the model. …”
    Get full text
    Article
  17. 77

    Enhancing unity-based AR with optimal lossless compression for digital twin assets. by Mohammed Hlayel, Hairulnizam Mahdin, Mohammad Hayajneh, Saleh H AlDaajeh, Siti Salwani Yaacob, Mazidah Mat Rejab

    Published 2024-01-01
    “…These challenges lead to computational inefficiencies that negatively impact user experience when dealing with sizeable 3D model assets. …”
    Get full text
    Article
  18. 78
  19. 79