Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
1261
Approximated 2-Bit Adders for Parallel In-Memristor Computing With a Novel Sum-of-Product Architecture
Published 2024-01-01“…Conventional computing methods struggle with the exponentially increasing demand for computational power, caused by applications including image processing and machine learning (ML). …”
Get full text
Article -
1262
-
1263
Comparative analysis of sandstone microtomographic image segmentation using advanced convolutional neural networks with pixelwise and physical accuracy evaluation
Published 2025-07-01“…These methods enable precise evaluations of critical properties such as porosity and fluid flow characteristics, thereby enhancing the efficiency of reservoir characterization. …”
Get full text
Article -
1264
-
1265
-
1266
Dynamic game and reliable recommendation based transferring reputation mechanism for mobile cloud computing
Published 2018-05-01“…The booming development of the mobile internet and cloud computing leads to the emerging of many mobile cloud platforms based services.However,since mobile users store lots of data and privacy information in the cloud when they are using the mobile cloud services,they are facing multiple increasingly serious security threats such as data leaks and privacy exposures.The data security and privacy protection was investigated in mobile cloud computing,aiming at the internal bad mouthing attacks and mobile attacks.A dynamic game and reliable recommendation based transferring reputation mechanism was proposed.First,a dynamic game based recommendation incentive mechanism was proposed.Secondly,a reliable recommendation reputation evaluation model was established based on the incentive mechanism.Last,a novel transferring reputation mechanism was proposed that combined the above mentioned incentive mechanism and reputation evaluation model.Simulation results demonstrate the proposed transferring reputation mechanism can defend against the internal bad mouthing attacks and mobile attacks effectively,enhance the credibility of mobile terminals and improve the data security and privacy protection of mobile cloud services.…”
Get full text
Article -
1267
Optimizing makespan and resource utilization in cloud computing environment via evolutionary scheduling approach.
Published 2024-01-01“…As a new computing resources distribution platform, cloud technology greatly influenced society with the conception of on-demand resource usage through virtualization technology. …”
Get full text
Article -
1268
Evaluation value of single-phase images from photon-counting CT-based low-dose pancreatic dynamic volume perfusion scanning for pancreatic cancer imaging
Published 2025-04-01“…Objective This study aims to evaluate the image quality of single-phase images in low-dose pancreatic dynamic volume perfusion computed tomography (VPCT) scans based on photon-counting computed tomography (PCCT) and assess their feasibility for morphological evaluation of pancreatic ductal adenocarcinoma (PDAC). …”
Get full text
Article -
1269
-
1270
An Integrated Node Selection Model Using FAHP and FTOPSIS for Data Retrieval in Ubiquitous Computing
Published 2022-01-01“…Ubiquitous computing (UC) is an advanced computing concept that makes services and computing available everywhere and anytime. …”
Get full text
Article -
1271
Soft-computing-based false alarm reduction for hierarchical data of intrusion detection system
Published 2019-10-01“…In this article, a soft-computing-based approach has been designed to reduce the false-positive rate for hierarchical data of anomaly-based intrusion detection system. …”
Get full text
Article -
1272
Investigating amplitude amplification in optimization-based control for a continuous stirred tank reactor
Published 2024-12-01“…Quantum computers, which utilize quantum states called ‘qubits’ to process information, are becoming of increased interest in a variety of fields because they have the potential to outperform classical computers in certain situations. …”
Get full text
Article -
1273
An anonymous access authentication scheme for vehicular ad hoc networks under edge computing
Published 2018-02-01“…Moreover, in this article, we combine vehicular ad hoc networks with edge computing together to provide a new clue for the development of mobile edge computing.…”
Get full text
Article -
1274
Sampling Method Based on Fuzzy Membership for Computing Negative Sample Credibility and Its Applications
Published 2025-07-01Get full text
Article -
1275
Perception of premium services based on the evolution of hyper-service network in mobile edge computing
Published 2025-05-01“…Next, we devise the evaluation indexes based on the topological characteristics of hypergraphs, which are updated according to the evolution of the hyper-service network. …”
Get full text
Article -
1276
Health Monitoring System with Hybrid Laser Sensor Networks and Cloud Computing for Subway Tunnels
Published 2021-01-01Get full text
Article -
1277
Empowering self-sustained agriculture: an IoT field tracking model driven by fog computing
Published 2025-04-01“…Fog platform brings computation and storing nearer at the network’s the border, allowing for the efficient processing of data produced by IoT devices across smart agricultural systems. …”
Get full text
Article -
1278
Computing Lightning-Induced Voltages on Overhead Distribution Lines Using the RBF-FDTD Approach
Published 2025-01-01Get full text
Article -
1279
A Scalable All-Digital Near-Memory Computing Architecture for Edge AIoT Applications
Published 2025-01-01“…The proposed design offers a configurable architecture capable of processing a wide range of CNN models with a computational efficiency of 94%. For evaluation purposes, widely recognized CNN benchmark models are utilized, showing a performance of 96GOPS and an energy efficiency of 1828GOPS/W for 8-bit precision at 200MHz. …”
Get full text
Article -
1280
Distributed energy sharing algorithm for Micro Grid energy system based on cloud computing
Published 2024-09-01Get full text
Article