-
481
A collaborative routing protocol for video streaming with fog computing in vehicular ad hoc networks
Published 2019-03-01“…Recent improvements in the routing protocols and topologies used in vehicular networks have contributed to improvements in scalability, reliability, and the quality of the information-sharing experience. …”
Get full text
Article -
482
Finding p-Hub Median Locations: An Empirical Study on Problems and Solution Techniques
Published 2017-01-01“…In this paper, we implement and evaluate several widely used methods for solving five standard hub location problems. To assess the scalability and solution qualities of these methods, three well-known datasets are used as case studies: Turkish Postal System, Australia Post, and Civil Aeronautics Board. …”
Get full text
Article -
483
Collusion-resistant cross-chain transaction scheme based on game theory and verifiable consensus
Published 2024-11-01“…In response, the counter-collusion cross-channel was proposed to facilitate scalable and collusion-resistant cross-chain transactions. …”
Get full text
Article -
484
Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN): A Survey
Published 2012-01-01“…These routing protocols have compared on the basis of different metric like energy consumption, memory uses, mobility, scalability, routing delay, an RERR message, a Hello message, and local repair. …”
Get full text
Article -
485
Crowd-based collaboration caching mechanism in smart identifier network
Published 2018-12-01“…Smart identifier network (SINET) is an innovative network architecture.Through dynamic collaboration of service resource,function groups and physical components,the network scalability,resource utilization and service quality were effectively improved by SINET,and an effective solution for the development of industrial Internet of things(IoT) could be provided.To promote content delivery in resource-constrained IoT,caching function was introduced in network components by SINET,and the bandwidth waste caused by traffic redundancy in resource-constrained node could be reduced.Therefore,how to efficiently cache content became an important research topic.Based on SINET architecture,a crowd-based collaboration cache (C2Cache) mechanism was proposed in this scheme.According to the actual network topology,the caching function group was dynamically created and optimized by C2Cache,and a function group as crowd minimum unit to execute the maximum benefit cache (MBC) algorithm was defined to maximize the caching space efficiency.With the self-developed emulation system,named EmuStack,the performance of C2Cache was evaluated.The experimental results show that,comparing with LCE,Random,Prob Cache,LCD and Greedy caching mechanisms,the cache hit rate can be improved effectively,then the average access time can be reduced significantly by C2Cache.In the simulated network scenario,the performance increases 15% to 30%.…”
Get full text
Article -
486
The Role of Ionic Liquids in Textile Processes: A Comprehensive Review
Published 2025-01-01“…Despite these advances, challenges such as high production costs and scalability remain barriers to the widespread adoption of ILs in the textile sector. …”
Get full text
Article -
487
Edge Computing in an IoT Base Station System: Reprogramming and Real-Time Tasks
Published 2019-01-01“…The paper concludes with a series of comprehensive analyses on scalability, responsiveness, and reliability. These analyses indicate a possible 60% reduction in the number of alarms, an edge response time of less than 0.1s, and an average downtime ratio of 0.66%.…”
Get full text
Article -
488
Discriminative zero-watermarking algorithm based on region XOR and ternary quantization
Published 2022-02-01“…Aiming at the problem that the current zero-watermark algorithm is insufficient in distinguishing the zero-watermark generated by the attacked image and the false-alarm image, a high-resolution zero-watermarking algorithm based on regional XOR and ternary quantization was proposed.In the process of zero watermark generation, the spatial and frequency domain features of the image were first extracted, the carrier feature and copyright watermark were redundantly constructed, and the frequency domain feature was used as an index to divide the redundant watermark into two regions, which were respectively related to the spatial domain features and the copyright watermark.The chaotic matrix was XOR, and the two regions after XOR were combined to obtain zero watermark.In the copyright authentication process, the airspace and frequency domain features were extracted from the attacked image, and the frequency domain feature was used as an index to divide the zero watermark into two regions, which were XOR with the airspace feature and the chaotic matrix respectively, and the redundantly constructed watermark was extracted.The image, after de-redundancy operation, was quantized into a matrix with only three values as the result of copyright authentication.The experimental results show that the proposed algorithm can effectively solve the false alarm problem of image zero watermark, and at the same time has high robustness under various attacks, the feature extraction algorithm can be arbitrarily replaced, and has high scalability.…”
Get full text
Article -
489
Design of Hydrological Telemetry System Based on NB-IoT Communication Technology
Published 2022-01-01“…With the progress in society and information technology, the rapid emergency response capability for urban flood,drought,and wind prevention needs to be improved.Given the demand, this paper adopts the low-power Internet of Things (NB-IoT) communication technology to design water and rain telemetry terminals in the way of product integration instead of traditional system integration.This technology further reduces the dependence of the equipment on the external environment and improves the stability and reliability of the front-end data acquisition of the hydrological telemetry system,making it possible to deploy the hydrological telemetry terminal for monitoring on a large scale.According to urban emergency prevention and control requirements,Guangzhou Nansha District Flood and Drought Prevention Headquarters Office constructed a new generation of hydrological telemetry system with low cost,strong scalability,and high reliability.By quickly covering urban flood risk points,the system can master real-time water and rain data in the key position of Nansha District to assist the emergency decision,improve emergency response capabilities,and realize the precise distribution of flood control forces,thus reducing the property losses for urban residents.The results show that the hydrological telemetry system based on NB-IoT communication technology applied on a large scale for the first time in Guangzhou can provide efficient data support for dealing with various disasters in flood seasons.…”
Get full text
Article -
490
The Advances in Neuromorphic Computing and Brain-Inspired Systems (ANCBIS).
Published 2025-01-01“…This study also addresses challenges related to scalability, robustness, and integration with existing systems, emphasizing the importance of cross-disciplinary collaboration to overcome these limitations. …”
Get full text
Article -
491
Secure and verifiable multi-keyword searchable encryption scheme in cloud
Published 2021-04-01“…Due to the advantages of cloud computing, such as virtualization and high scalability, individuals and enterprises are willing to outsource local data storage and computing to cloud servers.However, encryption breaks the linkability between the data.Although searchable encryption (SE) enables cloud servers to provide retrieval services of the encrypted data for data owners, cloud servers who are untrusted, may tamper and delete data, or learn information of the newly added encrypted files with previous trapdoors.Besides, single-keyword search inevitably incurs many unrelated results, resulting in a waste of bandwidth and computing resources.To address the problems above, an efficient and verifiable multi-keyword search encryption scheme was proposed, which could not only supported multiple-keyword search, but also realized the privacy of search pattern and forward security of the outsourced files.In the meanwhile, it also ensured the integrity check of the outsourced data.Through rigorous security verification, the proposed scheme was proved to be secure under the standard mode, and could resist offline keyword guesswork attack (KGA) on untrusted cloud servers.Finally, by comparing the efficiency and performance with the recent three searchable encryption schemes, the experimental results show that the proposed scheme has the best comprehensive performance in terms of function and efficiency among the four schemes.…”
Get full text
Article -
492
Parallelizing the cryo‐EM structure determination in THUNDER using GPU cluster
Published 2025-01-01“…Our approaches achieved remarkable improvement in performance and linear scalability. At an identical cost of the hardware, three‐fold more speed‐up was achieved. …”
Get full text
Article -
493
Integrating Environmental Data for Mental Health Monitoring: A Data-Driven IoT-Based Approach
Published 2025-01-01“…Preliminary results reveal high accuracy, scalability, and the potential to generate actionable insights, creating dynamic feedback loops for continuous improvement. …”
Get full text
Article -
494
Self-rerouting sensor network for electronic skin resilient to severe damage
Published 2025-01-01“…However, this method is costly, increases latency, and boosts power usage, limiting scalability for large, nuanced sensation-mimicking sensor arrays. …”
Get full text
Article -
495
TomatoGuard-YOLO: a novel efficient tomato disease detection method
Published 2025-01-01“…To address the shortcomings of existing detection methods in accuracy, computational efficiency, and scalability, this study propose TomatoGuard-YOLO, an advanced, lightweight, and highly efficient detection framework based on an improved YOLOv10 architecture. …”
Get full text
Article -
496
Semantic Schema Extraction in NoSQL Databases using BERT Embeddings
Published 2024-12-01“…NoSQL databases, valued for flexibility and scalability, pose analytics challenges due to their schema-less nature. …”
Get full text
Article -
497
A Systematic Literature Review on Robust Swarm Intelligence Algorithms in Search-Based Software Engineering
Published 2023-01-01“…They are used in many optimization problems due to their simplicity, flexibility, and scalability. These algorithms get the desired convergence during the search by balancing the exploration and exploitation processes. …”
Get full text
Article -
498
Utilizing Feature Selection Techniques for AI-Driven Tumor Subtype Classification: Enhancing Precision in Cancer Diagnostics
Published 2025-01-01“…However, challenges such as ensuring data quality, mitigating overfitting, and addressing scalability remain critical limitations of these methods. …”
Get full text
Article -
499
Device Characteristics and Capabilities Discovery for Multimedia Content
Published 2012-01-01“…By proposing such solution, we can provide flexible, extensible, and scalable method that provides more accurate information in resolving the content negotiation issues. …”
Get full text
Article -
500
Characterizing Grover search algorithm on large-scale superconducting quantum computers
Published 2025-01-01“…Here, we report results for the implementation and characterization of a three-qubit Grover search algorithm using the state-of-the-art scalable quantum computing technology of superconducting quantum architectures. …”
Get full text
Article