Skip to main content

previous disabled Page of 16
and
Your search also matched 2,581 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

A multi-scale no-reference video quality assessment method based on transformer

Include preview-only content
  1. Article

    Retraction Note: Towards an adaptive human-centric computing resource management framework based on resource prediction and multi-objective genetic algorithm

    Si Zheng, GuoBin Zhu, Jie Zhang, Wei Feng in Multimedia Tools and Applications (2024)

  2. Article

    Open Access

    ABWOA: adaptive boundary whale optimization algorithm for large-scale digital twin network construction

    Digital twin network (DTN) as an emerging network paradigm, have garnered growing attention. For large-scale networks, a crucial problem is how to effectively map physical networks onto the infrastructure plat...

    Hao Feng, Kun Cao, Gan Huang, Hao Liu in Journal of Cloud Computing (2024)

  3. Article

    Open Access

    Correction: FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records

    Kai Yang, Jiawei Du, **gchao Liu, Feng Xu, Ye Tang, Ming Liu in Journal of Cloud Computing (2024)

  4. Article

    Open Access

    Edge computing-oriented smart agricultural supply chain mechanism with auction and fuzzy neural networks

    Powered by data-driven technologies, precision agriculture offers immense productivity and sustainability benefits. However, fragmentation across farmlands necessitates distributed transparent automation. We d...

    Qing He, Hua Zhao, Yu Feng, Zehao Wang, Zhaofeng Ning in Journal of Cloud Computing (2024)

  5. Article

    Open Access

    FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records

    With the rapid growth of Internet of Vehicles (IoV) technology, the performance and privacy of IoV terminals (IoVT) have become increasingly important. This paper proposes a federated learning model for IoVT c...

    Kai Yang, Jiawei Du, **gchao Liu, Feng Xu, Ye Tang, Ming Liu in Journal of Cloud Computing (2024)

  6. Article

    Open Access

    Diabetes detection based on machine learning and deep learning approaches

    The increasing number of diabetes individuals in the globe has alarmed the medical sector to seek alternatives to improve their medical technologies. Machine learning and deep learning approaches are active re...

    Boon Feng Wee, Saaveethya Sivakumar, King Hann Lim in Multimedia Tools and Applications (2024)

  7. Article

    Open Access

    Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials

    Industrial data trading can considerably enhance the economic and social value of abundant data resources. However, traditional data trading models are plagued by critical flaws in fairness, security, privacy ...

    Junli Fang, Tao Feng, **an Guo, Rong Ma, Ye Lu in Journal of Cloud Computing (2024)

  8. Article

    Open Access

    A new method of dynamic network security analysis based on dynamic uncertain causality graph

    In the context of cloud computing, network attackers usually exhibit complex, dynamic, and diverse behavior characteristics. Existing research methods, such as Bayesian attack graphs, lack evidence correlation...

    Chunling Dong, Yu Feng, Wenqian Shang in Journal of Cloud Computing (2024)

  9. Article

    Open Access

    Small object Lentinula Edodes logs contamination detection method based on improved YOLOv7 in edge-cloud computing

    A small object Lentinus Edodes logs contamination detection method (SRW-YOLO) based on improved YOLOv7 in edge-cloud computing environment was proposed to address the problem of the difficulty in the detection...

    Xuefei Chen, Shouxin Sun, Chao Chen, **nlong Song, Qiulan Wu in Journal of Cloud Computing (2024)

  10. Chapter and Conference Paper

    DRAT Proofs of Unsatisfiability for SAT Modulo Monotonic Theories

    Generating proofs of unsatisfiability is a valuable capability of most SAT solvers, and is an active area of research for SMT solvers. This paper introduces the first method to efficiently generate proofs of u...

    Nick Feng, Alan J. Hu, Sam Bayless in Tools and Algorithms for the Construction … (2024)

  11. Article

    Open Access

    Hypergraph convolution mix DDPG for multi-aerial base station deployment

    Aerial base stations (AeBS), as crucial components of air-ground integrated networks, can serve as the edge nodes to provide flexible services to ground users. Optimizing the deployment of multiple AeBSs to ma...

    Haoran He, Fanqin Zhou, Yikun Zhao, Wen**g Li, Lei Feng in Journal of Cloud Computing (2023)

  12. Article

    Open Access

    PPO-based deployment and phase control for movable intelligent reflecting surface

    Intelligent reflecting surface (IRS) stands as a promising technology to revolutionize wireless communication by manipulating incident signal amplitudes and phases to enhance system performance. While existing...

    Yikun Zhao, Fanqin Zhou, Huaide Liu, Lei Feng, Wen**g Li in Journal of Cloud Computing (2023)

  13. Article

    Open Access

    LAE-GAN: a novel cloud-based Low-light Attention Enhancement Generative Adversarial Network for unpaired text images

    With the widespread adoption of mobile multimedia devices, the deployment of compute-intensive inference tasks on edge and resource-constrained devices, particularly in the context of low-light text detection,...

    Minglong Xue, Yanyi He, Peiqi **e, Zhengyang He, **n Feng in Journal of Cloud Computing (2023)

  14. Article

    Interactive communication in the process of physical education: are social media contributing to the improvement of physical training performance

    The development of modern technologies and the use of social networks create an environment for the exchange of information, interactive communication, learning, and optimization of various processes. The stud...

    Suyi Jiang, Chang Feng Ning in Universal Access in the Information Society (2023)

  15. Article

    Open Access

    HAP-assisted multi-aerial base station deployment for capacity enhancement via federated deep reinforcement learning

    Aerial base stations (AeBSs), as crucial components of air-ground integrated networks, are widely employed in cloud computing, disaster relief, and various applications. How to quickly and efficiently deploy m...

    Lei Liu, Haoran He, Fei Qi, Yikun Zhao, Weiliang **e in Journal of Cloud Computing (2023)

  16. Article

    Open Access

    A deep reinforcement learning assisted task offloading and resource allocation approach towards self-driving object detection

    With the development of communication technology and mobile edge computing (MEC), self-driving has received more and more research interests. However, most object detection tasks for self-driving vehicles are ...

    Lili Nie, Huiqiang Wang, Guangsheng Feng, Jiayu Sun in Journal of Cloud Computing (2023)

  17. Article

    Open Access

    Collaborative on-demand dynamic deployment via deep reinforcement learning for IoV service in multi edge clouds

    In vehicular edge computing, the low-delay services are invoked by the vehicles from the edge clouds while the vehicles moving on the roads. Because of the insufficiency of computing capacity and storage resou...

    Yuze Huang, Beipeng Feng, Yuhui Cao, Zhenzhen Guo, Miao Zhang in Journal of Cloud Computing (2023)

  18. Article

    Correction to: Real-time object tracking in the wild with Siamese network

    Feng Han, Shaokui Jiang, Jianmin Wu, Baile Xu in Multimedia Tools and Applications (2023)

  19. Article

    Correction to: Underwater target detection with an attention mechanism and improved scale

    **angyu Wei, Long Yu, Shengwei Tian, Pengcheng Feng in Multimedia Tools and Applications (2023)

  20. Article

    Open Access

    Blockchain-based collaborative edge computing: efficiency, incentive and trust

    The rise of 5G technology has driven the development of edge computing. Computation offloading is the key and challenging point in edge computing, which investigates offloading resource-intensive computing tas...

    Qinghang Gao, Jianmao **ao, Yuanlong Cao, Shuiguang Deng in Journal of Cloud Computing (2023)

previous disabled Page of 16