Showing 1,061 - 1,080 results of 3,870 for search 'edge process', query time: 0.13s Refine Results
  1. 1061

    Process optimization of silica encapsulation technique as a unique remediation technology for the treatment of crude oil contaminated soil by Vincent O. Akpoveta

    Published 2020-06-01
    “…Optimum concentrations of 60,000 ppm sodium silicate solution, 120,000 ppm SDS, applied at optimum pH and temperature of 5 and 25 °C respectively were established from the process optimization of the experimental technique. …”
    Get full text
    Article
  2. 1062

    Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption by Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG

    Published 2021-05-01
    “…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
    Get full text
    Article
  3. 1063

    Secure data offloading strategy for multi-UAV wireless networks based on minimum energy consumption by Gaofeng CUI, Yuanyuan XU, Shanghong ZHANG, Weidong WANG

    Published 2021-05-01
    “…To solve the problems of ground passive eavesdropping when ground users offload data to the multi-UAV(unmanned aerial vehicle) edge computing network, a secure data offloading strategy that minimized system energy consumption by jointly optimizing user matching and resource allocation was proposed.Considering the constraints of system delay, communication resources and computing resources, the probability of security interruption was used to restrict the security performance of the data offload process.By using block coordinate descent and successive convex approximation algorithm, the user transmission power, offload factor, UAV computing resource allocation and jamming power were jointly optimized.A pair-wise stable user matching algorithm was proposed to minimize the total energy consumption of UAV system.Simulation results demonstrate that the algorithm can realize the safe offloading of data, and has good performance in energy consumption and delay by comparing with the conventional strategies.…”
    Get full text
    Article
  4. 1064
  5. 1065

    Enhancing Cancer Diagnosis by Ismail Y. Maolood

    Published 2025-02-01
    “…By effectively integrating edge information into the level-set evolution process, the proposed method achieved impressive results. …”
    Get full text
    Article
  6. 1066

    Dynamic response of atomic processes in detached helium plasma induced by high-density transient pulse in Magnum-PSI by Yuki Hayashi, Hirohiko Tanaka, Shin Kajita, Noriyasu Ohno, Dogyun Hwangbo, Jordy Vernimmen, John Scholten, Hennie van der Meiden, Ivo Classen, Thomas Morgan

    Published 2025-01-01
    “…Pulsed plasma experiments simulating the transient divertor heat loads caused by edge-localized modes (ELMs) were conducted in Magnum-PSI, a linear plasma device capable of generating ITER-relevant conditions. …”
    Get full text
    Article
  7. 1067
  8. 1068

    Investigation and Empirical Analysis of Transfer Learning for Industrial IoT Networks by Preeti Yadav, Vinay Rishiwal, Mano Yadav, Aziz Alotaibi, Vinay Maurya, Udit Agarwal, Satyam Sharma

    Published 2024-01-01
    “…This paper examines the role of Transfer Learning in IIoT-N, identifying research gaps and challenges, and highlights its potential across various industrial applications, including predictive maintenance, anomaly detection, edge computing, process optimization, and cross-domain knowledge transfer. …”
    Get full text
    Article
  9. 1069

    Structure-Texture Dual Preserving for Remote Sensing Image Super Resolution by Kanghui Zhao, Tao Lu, Yanduo Zhang, Junjun Jiang, Zhongyuan Wang, Zixiang Xiong

    Published 2024-01-01
    “…First, we introduce the LR edge map as a prior structural expression for SR reconstruction, which further enhances the SR process with edge preservation capability. …”
    Get full text
    Article
  10. 1070
  11. 1071
  12. 1072

    Internet of things enabled deep learning monitoring system for realtime performance metrics and athlete feedback in college sports by Yang Hu, Yaxing Li, Benlai Cui, Hao Su, Pan Zhu

    Published 2025-08-01
    “…The system deployed edge computing for real-time local processing and cloud setup for high-complexity analytics, achieving a balance between responsiveness and accuracy. …”
    Get full text
    Article
  13. 1073

    Multi video stream collaborative adaptive offloading scheme based on equilibrium game theory by Shijun Yuan

    Published 2025-08-01
    “…Firstly, under the constraint of long-term MEC energy budget, the processing cost of video tasks is minimized by jointly optimizing data stream selection decisions, server offloading decisions, bandwidth resource allocation, and computing resource allocation. …”
    Get full text
    Article
  14. 1074

    DRBD-YOLOv8: A Lightweight and Efficient Anti-UAV Detection Model by Panpan Jiang, Xiaohua Yang, Yaping Wan, Tiejun Zeng, Mingxing Nie, Zhenghai Liu

    Published 2024-11-01
    “…Existing deep learning-based models for anti-UAV detection often cannot balance accuracy, processing speed, model size, and computational efficiency. …”
    Get full text
    Article
  15. 1075

    Adaptive conflict resolution for IoT transactions: A reinforcement learning-based hybrid validation protocol by Mohammad A. Al Khaldy, Ahmad Nabot, Ahmad al-Qerem, Issam Jebreen, Abdulbasit A. Darem, Asma A. Alhashmi, Mohammad Alauthman, Amjad Aldweesh

    Published 2025-07-01
    “…The proposed RL-CC protocol significantly reduces transaction abort rates, enhances concurrency management, and improves the efficiency of sensor data processing by ensuring that transactions are executed within their temporal validity window. …”
    Get full text
    Article
  16. 1076
  17. 1077

    OPGW fault localization method based on transformer and federated learning by Yan Zhigang, Cui Min, Su Xinyue, Wang Jinrui, Ma Xiao, Wu Lijun

    Published 2025-05-01
    “…A fault localization and analysis method for Optical Power-Grade Ground Wire (OPGW) based on transformer and federated learning (FedL) in a cloud edge collaborative environment is proposed. First, based on the cloud edge collaboration architecture, a model framework for OPGW fault location is designed through the collaboration between the cloud center and edge computing. …”
    Get full text
    Article
  18. 1078
  19. 1079

    Research and practice on technologies for full stack deployment of autonomous networks by Fei XUE, Bin CHEN, Jing LIU, Xiaoyang LIANG, Lin ZHU, Feng WANG, Tian LI, Liang ZHANG, Zhenzhen CHEN, Xiao LI

    Published 2023-08-01
    “…Autonomous networks achieve network self management, self optimization, and self repair by building intelligent network infrastructure.Autonomous network was divided into two key stages: AI model building and AI model deployment.However, the industry paid less attention to AI model deployment.The deployment phase of autonomous networks was systematically studied.Firstly, it elaborated on the independent deployment mode and full stack deployment mode of autonomous networks, and pointed out that full stack deployment was the main direction.Secondly, a detailed introduction was given to the full stack architecture with “five layers, dual domains, and four closed-loops”, which achieved full life cycle intelligence through a layered closed-loop design of resources and processes.Then, three core technologies for independent innovation were proposed: AI model training and inference integration to achieve rapid iterative updates of models, AI fabric technology to achieve customized application by rapid construction, and AI model cloud-edge collaborative deployment technology to achieve efficient application.Finally, the effectiveness of these three core technologies was verified through cases such as anomaly detection, smart telecommunication rooms, and equipment inspections.The deployment of autonomous networks was systematically explored, especially in terms of architecture design and core technology innovation, which had important reference value for telecommunication operators’ network digital transformation.…”
    Get full text
    Article
  20. 1080

    A Micro-Topography Enhancement Method for DEMs: Advancing Geological Hazard Identification by Qiulin He, Xiujun Dong, Haoliang Li, Bo Deng, Jingsong Sima

    Published 2025-03-01
    “…This work bridges signal processing and geospatial analysis, offering a reproducible framework for high-precision terrain feature extraction in complex environments.…”
    Get full text
    Article