Showing 561 - 580 results of 6,567 for search 'computing continues', query time: 0.17s Refine Results
  1. 561
  2. 562

    Toward Real-Time Recognition of Continuous Indian Sign Language: A Multi-Modal Approach Using RGB and Pose by M. Geetha, Neena Aloysius, Darshik A. Somasundaran, Amritha Raghunath, Prema Nedungadi

    Published 2025-01-01
    “…However, real-time recognition remains a critical challenge due to variability in signing speed, subtle hand gestures, and the computational complexity of processing video data in real time. …”
    Get full text
    Article
  3. 563

    Research on task offloading algorithm of mobile edge computing based on deep reinforcement learning in SDCN by Shouhua JIANG, Yiwu WANG

    Published 2024-02-01
    “…With the continuous development of network technology, the network topology distributed network control mode based on Fat-Tree gradually reveals its limitations.Software-defined data center network (SDCN) technology, as an improved technology of Fat-Tree network topology, has attracted more and more researchers’ attention.Firstly, an edge computing architecture in SDCN and a task offloading model based on the three-layer service architecture of the mobile edge computing (MEC) platform were built, combined with the actual application scenarios of the MEC platform.Through the same strategy experience playback and entropy regularization, the traditional deep Q-leaning network (DQN) algorithm was improved, and the task offloading strategy of MEC platform was optimized.An improved DQN algorithm based on same strategy empirical playback and entropy regularization (RSS2E-DQN) was compared with three other algorithms in load balancing, energy consumption, delay and network usage.It is verified that the improved algorithm has better performance in the above four aspects.…”
    Get full text
    Article
  4. 564

    Complexity Construction of Intelligent Marketing Strategy Based on Mobile Computing and Machine Learning Simulation Environment by Shuai Mao, Rong Huang

    Published 2021-01-01
    “…Mankind’s research on marketing has a history of hundreds of years, and it has been fruitful in continuous summary and research. Now the theory of marketing has gradually penetrated into the minds of every company and even individual. …”
    Get full text
    Article
  5. 565

    Integrated Communication, Sensing, Computing, and Control for Industrial Power Protection Systems: Analysis and Performance Optimization by Tongshan Liu, Jiangtao Zhang, You Liu, Chunyou Zhuang, Hao Li, Yuanyuan Chen

    Published 2025-01-01
    “…With the continuous advancement of industrial automation technology, industrial power security systems are playing an increasingly important role in ensuring production stability and improving efficiency. …”
    Get full text
    Article
  6. 566

    Evaluating the computing student experience of a new block model: student results, satisfaction and comments by Raina Mason, Carolyn Seton, Jenelle Benson, Prithwi Raj Chakraborty

    Published 2025-12-01
    “…This study explores the impact of block models on computing students’ learning and study experience at an Australian university. …”
    Get full text
    Article
  7. 567

    Towards Human-like Artificial Intelligence: A Review of Anthropomorphic Computing in AI and Future Trends by Jiacheng Zhang, Haolan Zhang

    Published 2025-06-01
    “…Additionally, the trend of increasing model parameters to enhance accuracy has reached its limits and cannot continue indefinitely. Therefore, this paper proposes revisiting the history of AI development from the perspective of “anthropomorphic computing”, primarily analyzing existing AI technologies that incorporate structures or concepts resembling human brain thinking. …”
    Get full text
    Article
  8. 568

    Edge Server Selection with Round-Robin-Based Task Processing in Multiserver Mobile Edge Computing by Kahlan Aljobory, Mehmet Akif Yazici

    Published 2025-05-01
    “…Mobile edge computing was conceived to address the increasing computing demand generated by users at the communication network edge. …”
    Get full text
    Article
  9. 569

    Enhancing Property-Based Token Attestation With Homomorphic Encryption (PTA-HE) for Secure Mobile Computing by Thinh Le Vinh, Huan Thien Tran, Samia Bouzefrane

    Published 2025-01-01
    “…Our main contributions are: the introduction of PTA-HE, which resolves these vulnerabilities by enabling computations directly on encrypted data, ensuring continuous protection and resilience against unauthorized access and manipulation; a strategic employment of Trusted Third Parties (TTPs) for secure attestation management, leveraging HE to maintain data confidentiality throughout the entire attestation workflow; rigorous experimental evaluations quantifying computational overhead, communication costs, latency, and scalability implications, transparently illustrating the performance trade-offs associated with enhanced security; and formal verification using the Scyther tool demonstrating PTA-HE’s superior correctness and robustness against multiple security threats, such as replay and man-in-the-middle attacks. …”
    Get full text
    Article
  10. 570

    Accuracy-Aware MLLM Task Offloading and Resource Allocation in UAV-Assisted Satellite Edge Computing by Huabing Yan, Hualong Huang, Zijia Zhao, Zhi Wang, Zitian Zhao

    Published 2025-07-01
    “…However, cloud computing dependency introduces latency, bandwidth, and privacy challenges, while IoT device limitations require efficient distributed computing solutions. …”
    Get full text
    Article
  11. 571

    STAR-RIS enabled covert integration of sensing communication and over-the-air computing with analysis and optimization by Miao Zhang, Chao Wang, Tianyu Ren, Jing Li

    Published 2025-05-01
    “…Abstract This paper addresses the challenges of security and reliability in simultaneously transmitting and reflecting reconfigurable intelligence surface (STAR-RIS) assisted integrated sensing, communication, and computation over-the-air (ISCCO) system. We investigate the trade-offs between covert communication, covert sensing, and Over-the-Air Computation (AirComp) reliability in scenarios involving both communication and sensing wardens. …”
    Get full text
    Article
  12. 572

    Resource Adaptive Automated Task Scheduling Using Deep Deterministic Policy Gradient in Fog Computing by Prashanth Choppara, S. Sudheer Mangalampalli

    Published 2025-01-01
    “…This paper presents a novel adaptive scheduling framework based on the DDPG algorithm for task scheduling optimization in fog computing environments. Our framework is based on DDPG, a reinforcement learning algorithm well suited for continuous action spaces, adapting scheduling strategies to real-time changes in task demands and resource availability. …”
    Get full text
    Article
  13. 573

    Optimizing Trade-Offs in Reliability, Security, and Freshness for Integrated Communication, Sensing, and Over-the-Air Computing by Tianyu Ren, Miao Zhang, Fangyu Wang, Kaiyuan Zheng

    Published 2025-01-01
    “…To tackle this issue, this paper proposes an integrated sensing, communication, and computation over-the-air (ISCCO) framework and presents effective system design and optimization strategies. …”
    Get full text
    Article
  14. 574

    Binary-Weighted Neural Networks Using FeRAM Array for Low-Power AI Computing by Seung-Myeong Cho, Jaesung Lee, Hyejin Jo, Dai Yun, Jihwan Moon, Kyeong-Sik Min

    Published 2025-07-01
    “…Artificial intelligence (AI) has become ubiquitous in modern computing systems, from high-performance data centers to resource-constrained edge devices. …”
    Get full text
    Article
  15. 575

    What If VEC Is Moving: Probabilistic Model of Task Execution Through Offloading in Vehicular Computing Environments by Asmaa Ibrahim, Bassem Mokhtar

    Published 2024-01-01
    “…The proposed model ensures continuous connectivity by extending the dwell time between the service requester and the vehicular computational resource. …”
    Get full text
    Article
  16. 576

    MICROSERVICE ARCHITECTURE FOR BUILDING HIGH-AVAILABILITY DISTRIBUTED AUTOMATED COMPUTING SYSTEM IN A CLOUD INFRASTRUCTURE by Denis Zolotariov

    Published 2021-09-01
    “…The article is devoted to the research and development of a highly available distributed automated computing system by iterative algorithms based on the microservice architecture in a cloud infrastructure. …”
    Get full text
    Article
  17. 577

    The role of computed tomography in the diagnosis of malperfusion syndrome in acute aortic dissection (literature review) by A. M. Nunaeva, O. A. Zabavskaya, R. Sh. Muslimov, L. T. Khamidova, L. S. Kokov

    Published 2022-07-01
    “…Timely diagnosis and treatment of patients with acute aortic dissection continues to be one of the most important and discussed problems in emergency medicine. …”
    Get full text
    Article
  18. 578

    The Value of Functional Multislice Computed Tomography in the Diagnosis of Instability of the Cervical Spinal Motion Segments by S. К. Ternovoy, N. S. Serova, A. S. Abramov, T. I. Miskaryan

    Published 2020-11-01
    “…Today, search for optimal diagnostic methods continues. The authors propose a new diagnostic technique - functional multislice computed tomography (fMSCT). …”
    Get full text
    Article
  19. 579

    Integrative Computational Approaches for Understanding Drug Resistance in HIV-1 Protease Subtype C by Sankaran Venkatachalam, Nisha Muralidharan, Ramesh Pandian, Yasien Sayed, M. Michael Gromiha

    Published 2025-06-01
    “…The emergence of resistance is concerning because the virus continues to replicate despite treatment; hence, it is necessary to develop drugs specifically against subtype C. …”
    Get full text
    Article
  20. 580