Showing 481 - 500 results of 1,667 for search '"scalability"', query time: 0.05s Refine Results
  1. 481

    A collaborative routing protocol for video streaming with fog computing in vehicular ad hoc networks by Paulo Bezerra, Adalberto Melo, Allan Douglas, Hugo Santos, Denis Rosário, Eduardo Cerqueira

    Published 2019-03-01
    “…Recent improvements in the routing protocols and topologies used in vehicular networks have contributed to improvements in scalability, reliability, and the quality of the information-sharing experience. …”
    Get full text
    Article
  2. 482

    Finding p-Hub Median Locations: An Empirical Study on Problems and Solution Techniques by Xiaoqian Sun, Weibin Dai, Yu Zhang, Sebastian Wandelt

    Published 2017-01-01
    “…In this paper, we implement and evaluate several widely used methods for solving five standard hub location problems. To assess the scalability and solution qualities of these methods, three well-known datasets are used as case studies: Turkish Postal System, Australia Post, and Civil Aeronautics Board. …”
    Get full text
    Article
  3. 483

    Collusion-resistant cross-chain transaction scheme based on game theory and verifiable consensus by JIA Xuedan, WANG Liangmin, HUANG Longxia

    Published 2024-11-01
    “…In response, the counter-collusion cross-channel was proposed to facilitate scalable and collusion-resistant cross-chain transactions. …”
    Get full text
    Article
  4. 484

    Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN): A Survey by Vinay Kumar, Sudarshan Tiwari

    Published 2012-01-01
    “…These routing protocols have compared on the basis of different metric like energy consumption, memory uses, mobility, scalability, routing delay, an RERR message, a Hello message, and local repair. …”
    Get full text
    Article
  5. 485

    Crowd-based collaboration caching mechanism in smart identifier network by Haifeng LI, Wei QUAN, Nan CHENG, Hongke ZHANG, Xuemin SHEN

    Published 2018-12-01
    “…Smart identifier network (SINET) is an innovative network architecture.Through dynamic collaboration of service resource,function groups and physical components,the network scalability,resource utilization and service quality were effectively improved by SINET,and an effective solution for the development of industrial Internet of things(IoT) could be provided.To promote content delivery in resource-constrained IoT,caching function was introduced in network components by SINET,and the bandwidth waste caused by traffic redundancy in resource-constrained node could be reduced.Therefore,how to efficiently cache content became an important research topic.Based on SINET architecture,a crowd-based collaboration cache (C2Cache) mechanism was proposed in this scheme.According to the actual network topology,the caching function group was dynamically created and optimized by C2Cache,and a function group as crowd minimum unit to execute the maximum benefit cache (MBC) algorithm was defined to maximize the caching space efficiency.With the self-developed emulation system,named EmuStack,the performance of C2Cache was evaluated.The experimental results show that,comparing with LCE,Random,Prob Cache,LCD and Greedy caching mechanisms,the cache hit rate can be improved effectively,then the average access time can be reduced significantly by C2Cache.In the simulated network scenario,the performance increases 15% to 30%.…”
    Get full text
    Article
  6. 486

    The Role of Ionic Liquids in Textile Processes: A Comprehensive Review by Anastasia Anceschi, Claudia Riccardi, Alessia Patrucco

    Published 2025-01-01
    “…Despite these advances, challenges such as high production costs and scalability remain barriers to the widespread adoption of ILs in the textile sector. …”
    Get full text
    Article
  7. 487

    Edge Computing in an IoT Base Station System: Reprogramming and Real-Time Tasks by Huifeng Wu, Junjie Hu, Jiexiang Sun, Danfeng Sun

    Published 2019-01-01
    “…The paper concludes with a series of comprehensive analyses on scalability, responsiveness, and reliability. These analyses indicate a possible 60% reduction in the number of alarms, an edge response time of less than 0.1s, and an average downtime ratio of 0.66%.…”
    Get full text
    Article
  8. 488

    Discriminative zero-watermarking algorithm based on region XOR and ternary quantization by Deyang WU, Sen HU, Miaomiao WANG, Haibo JIN, Changbo QU, Yong TANG

    Published 2022-02-01
    “…Aiming at the problem that the current zero-watermark algorithm is insufficient in distinguishing the zero-watermark generated by the attacked image and the false-alarm image, a high-resolution zero-watermarking algorithm based on regional XOR and ternary quantization was proposed.In the process of zero watermark generation, the spatial and frequency domain features of the image were first extracted, the carrier feature and copyright watermark were redundantly constructed, and the frequency domain feature was used as an index to divide the redundant watermark into two regions, which were respectively related to the spatial domain features and the copyright watermark.The chaotic matrix was XOR, and the two regions after XOR were combined to obtain zero watermark.In the copyright authentication process, the airspace and frequency domain features were extracted from the attacked image, and the frequency domain feature was used as an index to divide the zero watermark into two regions, which were XOR with the airspace feature and the chaotic matrix respectively, and the redundantly constructed watermark was extracted.The image, after de-redundancy operation, was quantized into a matrix with only three values as the result of copyright authentication.The experimental results show that the proposed algorithm can effectively solve the false alarm problem of image zero watermark, and at the same time has high robustness under various attacks, the feature extraction algorithm can be arbitrarily replaced, and has high scalability.…”
    Get full text
    Article
  9. 489

    Design of Hydrological Telemetry System Based on NB-IoT Communication Technology by ZHANG Xinmeng, LIU Shuyang, WANG Canhui

    Published 2022-01-01
    “…With the progress in society and information technology, the rapid emergency response capability for urban flood,drought,and wind prevention needs to be improved.Given the demand, this paper adopts the low-power Internet of Things (NB-IoT) communication technology to design water and rain telemetry terminals in the way of product integration instead of traditional system integration.This technology further reduces the dependence of the equipment on the external environment and improves the stability and reliability of the front-end data acquisition of the hydrological telemetry system,making it possible to deploy the hydrological telemetry terminal for monitoring on a large scale.According to urban emergency prevention and control requirements,Guangzhou Nansha District Flood and Drought Prevention Headquarters Office constructed a new generation of hydrological telemetry system with low cost,strong scalability,and high reliability.By quickly covering urban flood risk points,the system can master real-time water and rain data in the key position of Nansha District to assist the emergency decision,improve emergency response capabilities,and realize the precise distribution of flood control forces,thus reducing the property losses for urban residents.The results show that the hydrological telemetry system based on NB-IoT communication technology applied on a large scale for the first time in Guangzhou can provide efficient data support for dealing with various disasters in flood seasons.…”
    Get full text
    Article
  10. 490

    The Advances in Neuromorphic Computing and Brain-Inspired Systems (ANCBIS). by DanielRaj K, Ponseka G, Bharath Sanjai Lordwin D J3

    Published 2025-01-01
    “…This study also addresses challenges related to scalability, robustness, and integration with existing systems, emphasizing the importance of cross-disciplinary collaboration to overcome these limitations. …”
    Get full text
    Article
  11. 491

    Secure and verifiable multi-keyword searchable encryption scheme in cloud by Jianhong ZHANG, Menglong WU, Jing WANG, Pei LIU, Zhengtao JIANG, Changgen PENG

    Published 2021-04-01
    “…Due to the advantages of cloud computing, such as virtualization and high scalability, individuals and enterprises are willing to outsource local data storage and computing to cloud servers.However, encryption breaks the linkability between the data.Although searchable encryption (SE) enables cloud servers to provide retrieval services of the encrypted data for data owners, cloud servers who are untrusted, may tamper and delete data, or learn information of the newly added encrypted files with previous trapdoors.Besides, single-keyword search inevitably incurs many unrelated results, resulting in a waste of bandwidth and computing resources.To address the problems above, an efficient and verifiable multi-keyword search encryption scheme was proposed, which could not only supported multiple-keyword search, but also realized the privacy of search pattern and forward security of the outsourced files.In the meanwhile, it also ensured the integrity check of the outsourced data.Through rigorous security verification, the proposed scheme was proved to be secure under the standard mode, and could resist offline keyword guesswork attack (KGA) on untrusted cloud servers.Finally, by comparing the efficiency and performance with the recent three searchable encryption schemes, the experimental results show that the proposed scheme has the best comprehensive performance in terms of function and efficiency among the four schemes.…”
    Get full text
    Article
  12. 492

    Parallelizing the cryo‐EM structure determination in THUNDER using GPU cluster by Zhao Wang, Huabin Ruan, Guangwen Yang, Xueming Li

    Published 2025-01-01
    “…Our approaches achieved remarkable improvement in performance and linear scalability. At an identical cost of the hardware, three‐fold more speed‐up was achieved. …”
    Get full text
    Article
  13. 493

    Integrating Environmental Data for Mental Health Monitoring: A Data-Driven IoT-Based Approach by Sanaz Zamani, Minh Nguyen, Roopak Sinha

    Published 2025-01-01
    “…Preliminary results reveal high accuracy, scalability, and the potential to generate actionable insights, creating dynamic feedback loops for continuous improvement. …”
    Get full text
    Article
  14. 494

    Self-rerouting sensor network for electronic skin resilient to severe damage by T. Ozaki, N. Ohta, M. Fujiyoshi

    Published 2025-01-01
    “…However, this method is costly, increases latency, and boosts power usage, limiting scalability for large, nuanced sensation-mimicking sensor arrays. …”
    Get full text
    Article
  15. 495

    TomatoGuard-YOLO: a novel efficient tomato disease detection method by Xuewei Wang, Jun Liu

    Published 2025-01-01
    “…To address the shortcomings of existing detection methods in accuracy, computational efficiency, and scalability, this study propose TomatoGuard-YOLO, an advanced, lightweight, and highly efficient detection framework based on an improved YOLOv10 architecture. …”
    Get full text
    Article
  16. 496

    Semantic Schema Extraction in NoSQL Databases using BERT Embeddings by Saad Belefqih, Ahmed Zellou, Mouna Berquedich

    Published 2024-12-01
    “…NoSQL databases, valued for flexibility and scalability, pose analytics challenges due to their schema-less nature. …”
    Get full text
    Article
  17. 497

    A Systematic Literature Review on Robust Swarm Intelligence Algorithms in Search-Based Software Engineering by Alam Zeb, Fakhrud Din, Muhammad Fayaz, Gulzar Mehmood, Kamal Z. Zamli

    Published 2023-01-01
    “…They are used in many optimization problems due to their simplicity, flexibility, and scalability. These algorithms get the desired convergence during the search by balancing the exploration and exploitation processes. …”
    Get full text
    Article
  18. 498

    Utilizing Feature Selection Techniques for AI-Driven Tumor Subtype Classification: Enhancing Precision in Cancer Diagnostics by Jihan Wang, Zhengxiang Zhang, Yangyang Wang

    Published 2025-01-01
    “…However, challenges such as ensuring data quality, mitigating overfitting, and addressing scalability remain critical limitations of these methods. …”
    Get full text
    Article
  19. 499

    Device Characteristics and Capabilities Discovery for Multimedia Content by Mohd Faisal Ibrahim, Saadiah Yahya, Mohd Nasir Taib

    Published 2012-01-01
    “…By proposing such solution, we can provide flexible, extensible, and scalable method that provides more accurate information in resolving the content negotiation issues. …”
    Get full text
    Article
  20. 500

    Characterizing Grover search algorithm on large-scale superconducting quantum computers by Muhammad AbuGhanem

    Published 2025-01-01
    “…Here, we report results for the implementation and characterization of a three-qubit Grover search algorithm using the state-of-the-art scalable quantum computing technology of superconducting quantum architectures. …”
    Get full text
    Article