Suggested Topics within your search.
Suggested Topics within your search.
-
181
Research on security defense of mobile edge computing
Published 2021-02-01“…Mobile Edge Computing can solve the problem of heavy backhaul link overloaded and long delay effectively by further extending the telecommunication cellular network to other wireless access networks.However, the MEC nodes are exposed to the edge of the network whose computing resource, storage capacity and energy resource are limited, they are more vulnerable to the illegal attacks by attackers.Based on the briefly analysis of the security threats faced by mobile edge computing, some key problems and challenges of mobile edge computing for four different security subjects, device security, node security, network resources and tasks, and migration security are summed up and expounded, and the existing security solutions were summarized.Finally, the open research and future development trend of mobile edge computing security defense on three aspects that limited resource defense model in the dynamic scene, resource deployment based on comprehensive trust and user-centered service reliability assurance are discussed.…”
Get full text
Article -
182
OpenNavSense platform: A low-cost, open-source inertial navigation system for the evaluation of estimation algorithms
Published 2025-03-01“…To address these limitations, an open-source, low-cost platform named INS OpenNavSense has been developed. …”
Get full text
Article -
183
-
184
Computing the Deep Semantics of Visual Communications
Published 2025-01-01“…This paper acknowledges a recognized escalating problem in the development of contemporary informational technologies and presents a practical solution for communicational quality management by employing an innovative approach to the computational aesthetic evaluation (CAE). After discussing the problem and attempted approaches to its alleviation, the paper offers a novel expert solution by presenting an original research approach and its resulting open-sourced model which outperforms its current state-of-the-art competition in semantic and stylistic classification, at the same time providing an idiomatic measure for objective aesthetic evaluation and demonstrating semantically rich and professionally recognized explanatory power which can serve as the solid basis for development of reliable and user friendly content retrieval, generative or auxiliary design applications. …”
Get full text
Article -
185
Mobile Cloud Computing: Taxonomy and Challenges
Published 2020-01-01“…Mobile cloud computing (MCC) holds a new dawn of computing, where the cloud users are attracted to multiple services through the Internet. …”
Get full text
Article -
186
Open challenges for the automatic synthesis of clinical trials
Published 2025-02-01Get full text
Article -
187
-
188
Open Reading Frame Phylogenetic Analysis on the Cloud
Published 2013-01-01“…Biocloud is an efficient, scalable, and robust bioinformatics computing service. In this paper, we propose a cloud-based open reading frame phylogenetic analysis service. …”
Get full text
Article -
189
UAV Mission Computer Operation Mode Optimization Focusing on Computational Energy Efficiency and System Responsiveness
Published 2024-11-01“…The paper provides an experimental assessment of the ‘Boryviter 0.1’ computing platform, which is implemented on the ATSAMV71 microprocessor and operates under the open-source FreeRTOS operating system. …”
Get full text
Article -
190
-
191
-
192
Unsupervised Particle Tracking with Neuromorphic Computing
Published 2025-04-01“…We show how a spiking neural network is capable of successfully identifying in a completely unsupervised way the signal left by charged particles in the presence of conspicuous noise from accidental or combinatorial hits, opening the way to applications of neuromorphic computing to particle tracking. …”
Get full text
Article -
193
Trusted edge computing for smart healthcare
Published 2020-06-01“…With the rapid development of internet of things technology,in order to better develop modern medicine,avoid the “isolated” crisis of information,and meet the requirements of timeliness and computing performance of massive data generated by edge devices,it is a new trend of the times to combine edge computing with smart healthcare treatment.However,edge computing has a certain degree of openness,and it is prone to potential safety hazards.Therefore,people pay more and more attention to the security and privacy protection of edge computing system for smart healthcare treatment.The edge computing system and its architecture for smart healthcare were introduced,and the security risks encountered by smart healthcare in edge computing was explained,and some scholars’ solutions to the security risks were introduced.Finally,a security framework,and specific solutions for security and privacy protection under the framework were put forward,which providing some help for the trusted research of smart healthcare edge computing.…”
Get full text
Article -
194
High dimensional counterdiabatic quantum computing
Published 2025-07-01“…Abstract The digital version of adiabatic quantum computing enhanced by counterdiabatic driving, known as digitized counterdiabatic quantum computing, has emerged as a paradigm that opens the door to fast and low-depth algorithms. …”
Get full text
Article -
195
Optical next generation reservoir computing
Published 2025-07-01“…Recently, a new RC paradigm known as next generation reservoir computing (NGRC) further improves expressivity but compromises its physical openness, posing challenges for realizations in physical systems. …”
Get full text
Article -
196
Metasurfaces & prospects of computer optics
Published 2025-06-01“…Metasurfaces represent a revolutionary paradigm shift in optics that has opened the era of multifunctional light transformations using ultra-thin elements. …”
Get full text
Article -
197
Computer Vision-Based Drowsiness Detection Using Handcrafted Feature Extraction for Edge Computing Devices
Published 2025-01-01“…Our innovative approach leverages computer vision by combining facial feature detection using Dlib, head pose estimation with the HOPEnet model, and analyses of the percentage of eyelid closure over time (PERCLOS) and the percentage of mouth opening over time (POM). …”
Get full text
Article -
198
Comparison of cone beam-computed and micro-computed tomography data for measuring facial canal dehiscence
Published 2025-04-01“…Detection of facial canal openings in the clinic is performed using imaging methods such as high-resolution computed tomography (HRCT). …”
Get full text
Article -
199
Ten simple rules for the open development of scientific software.
Published 2012-01-01Get full text
Article -
200
Key predictors of student proficiency in quantum computing
Published 2025-01-01Get full text
Article