![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
303 Result(s)
-
Article
Retraction Note: Towards an adaptive human-centric computing resource management framework based on resource prediction and multi-objective genetic algorithm
-
Article
Open AccessABWOA: adaptive boundary whale optimization algorithm for large-scale digital twin network construction
Digital twin network (DTN) as an emerging network paradigm, have garnered growing attention. For large-scale networks, a crucial problem is how to effectively map physical networks onto the infrastructure plat...
-
Article
Open AccessCorrection: FLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records
-
Article
Open AccessEdge computing-oriented smart agricultural supply chain mechanism with auction and fuzzy neural networks
Powered by data-driven technologies, precision agriculture offers immense productivity and sustainability benefits. However, fragmentation across farmlands necessitates distributed transparent automation. We d...
-
Article
Open AccessFLM-ICR: a federated learning model for classification of internet of vehicle terminals using connection records
With the rapid growth of Internet of Vehicles (IoV) technology, the performance and privacy of IoV terminals (IoVT) have become increasingly important. This paper proposes a federated learning model for IoVT c...
-
Article
Open AccessDiabetes detection based on machine learning and deep learning approaches
The increasing number of diabetes individuals in the globe has alarmed the medical sector to seek alternatives to improve their medical technologies. Machine learning and deep learning approaches are active re...
-
Article
Open AccessBlockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials
Industrial data trading can considerably enhance the economic and social value of abundant data resources. However, traditional data trading models are plagued by critical flaws in fairness, security, privacy ...
-
Article
Open AccessA new method of dynamic network security analysis based on dynamic uncertain causality graph
In the context of cloud computing, network attackers usually exhibit complex, dynamic, and diverse behavior characteristics. Existing research methods, such as Bayesian attack graphs, lack evidence correlation...
-
Article
Open AccessSmall object Lentinula Edodes logs contamination detection method based on improved YOLOv7 in edge-cloud computing
A small object Lentinus Edodes logs contamination detection method (SRW-YOLO) based on improved YOLOv7 in edge-cloud computing environment was proposed to address the problem of the difficulty in the detection...
-
Chapter and Conference Paper
DRAT Proofs of Unsatisfiability for SAT Modulo Monotonic Theories
Generating proofs of unsatisfiability is a valuable capability of most SAT solvers, and is an active area of research for SMT solvers. This paper introduces the first method to efficiently generate proofs of u...
-
Article
Open AccessHypergraph convolution mix DDPG for multi-aerial base station deployment
Aerial base stations (AeBS), as crucial components of air-ground integrated networks, can serve as the edge nodes to provide flexible services to ground users. Optimizing the deployment of multiple AeBSs to ma...
-
Article
Open AccessPPO-based deployment and phase control for movable intelligent reflecting surface
Intelligent reflecting surface (IRS) stands as a promising technology to revolutionize wireless communication by manipulating incident signal amplitudes and phases to enhance system performance. While existing...
-
Article
Open AccessLAE-GAN: a novel cloud-based Low-light Attention Enhancement Generative Adversarial Network for unpaired text images
With the widespread adoption of mobile multimedia devices, the deployment of compute-intensive inference tasks on edge and resource-constrained devices, particularly in the context of low-light text detection,...
-
Article
Interactive communication in the process of physical education: are social media contributing to the improvement of physical training performance
The development of modern technologies and the use of social networks create an environment for the exchange of information, interactive communication, learning, and optimization of various processes. The stud...
-
Article
Open AccessHAP-assisted multi-aerial base station deployment for capacity enhancement via federated deep reinforcement learning
Aerial base stations (AeBSs), as crucial components of air-ground integrated networks, are widely employed in cloud computing, disaster relief, and various applications. How to quickly and efficiently deploy m...
-
Article
Open AccessA deep reinforcement learning assisted task offloading and resource allocation approach towards self-driving object detection
With the development of communication technology and mobile edge computing (MEC), self-driving has received more and more research interests. However, most object detection tasks for self-driving vehicles are ...
-
Article
Open AccessCollaborative on-demand dynamic deployment via deep reinforcement learning for IoV service in multi edge clouds
In vehicular edge computing, the low-delay services are invoked by the vehicles from the edge clouds while the vehicles moving on the roads. Because of the insufficiency of computing capacity and storage resou...
-
Article
Correction to: Real-time object tracking in the wild with Siamese network
-
Article
Correction to: Underwater target detection with an attention mechanism and improved scale
-
Article
Open AccessBlockchain-based collaborative edge computing: efficiency, incentive and trust
The rise of 5G technology has driven the development of edge computing. Computation offloading is the key and challenging point in edge computing, which investigates offloading resource-intensive computing tas...