Results 31 to 40 of about 63,520 (235)

Intent Arabic text categorisation based on different machine learning and term frequency

open access: yesIET Networks, EarlyView., 2022
Abstract The complexity of Internet network configurations has made managing networks a complicated undertaking. Intent‐Based Networking (IBN) is a potential solution to this issue. In contrast to conventional networks, where a concrete description of the settings typically conveys a network administrator's goal kept on each device, an administrator's ...
Mohammad Fadhil Mahdi   +1 more
wiley   +1 more source

Web Administration Interface for Caché [PDF]

open access: yes, 2015
Úkolem této bakalářské práce je vytvořit webové rozhraní pro správu databáze Caché, které bude umožňovat přehledně a logicky zobrazovat obsah databáze, provádět změny v databázi, správu uživatelů a databází.
Valena, Pavel
core  

Multiobjective Codesign Optimization of a Planar Pneumatic Artificial Muscle‐Based Snake‐Like Robot for Enhanced Agility and Energy Efficiency

open access: yesAdvanced Robotics Research, EarlyView.
A codesign multiobjective optimization framework was developed to enhance the morphology and controller of a snake‐like robot driven by artificial muscles. It improved planar locomotion, agility, and power efficiency. The approach optimized link geometry and controller gains, revealing that shorter muscles near joints and longer linkages maximize ...
Ayla Valles, Mahdi Haghshenas‐Jaryani
wiley   +1 more source

Design and implementation of geographic information system with mobile terminal and 5G network

open access: yesIET Networks, EarlyView., 2022
Abstract Remote insurance mainly completes quotation, insurance application and payment through the PC terminal and mobile terminal, and the premium directly enters the insurance account. This article takes remote insurance as an example. First, it analyses the requirements of the remote insurance and insurance system, and then collects data from the ...
Huijun Xiao, Tangsen Huang, Ensong Jiang
wiley   +1 more source

Epidemic dynamics edge caching strategy for 6G networks

open access: yesFrontiers in Physics
By caching popular content on edge servers closer to users to respond to users’ content requests in 6G networks, the transmission load of backhaul links can be reduced.
Xinyi Wang, Yuexia Zhang, Siyu Zhang
doaj   +1 more source

C3C: A New Static Content-Based Three-Level Web Cache

open access: yesIEEE Access, 2019
One way of improving the performance of a search engine is increasing the hit ratio of the search engine cache. A common and widely used approach for increasing the hit ratio is a combination of the result cache, the posting list cache, and the ...
Thanh Trinh   +2 more
doaj   +1 more source

Vizard: Passing Over Profiling-Based Detection by Manipulating Performance Counters

open access: yesIEEE Access, 2023
Cache side-channel attacks have been serious security threats to server computer systems, thus researchers have proposed software-based defense approaches that can detect the security attacks. Profiling-based detectors are lightweight detection solutions
Minkyu Song, Taeweon Suh, Gunjae Koo
doaj   +1 more source

Continual Learning for Multimodal Data Fusion of a Soft Gripper

open access: yesAdvanced Robotics Research, EarlyView.
Models trained on a single data modality often struggle to generalize when exposed to a different modality. This work introduces a continual learning algorithm capable of incrementally learning different data modalities by leveraging both class‐incremental and domain‐incremental learning scenarios in an artificial environment where labeled data is ...
Nilay Kushawaha, Egidio Falotico
wiley   +1 more source

Distributed wireless network resource optimisation method based on mobile edge computing

open access: yesIET Networks, EarlyView., 2022
This paper mainly compares the network ranking leader, consumption amount and network signal reception of the three algorithms. The study found that in terms of network sort captain, there are significant differences between the CPLEX algorithm, the CCST algorithm, and edge computing methods. The CCST algorithm and edge computing have little difference
Jiongting Jiang   +4 more
wiley   +1 more source

OPTIMASI REPLACEMENT STRATEGY UNTUK METODE PROGRESSIVE CACHE PADA CONTENT CENTRIC NETWORKING (CCN)

open access: yesJUTI: Jurnal Ilmiah Teknologi Informasi, 2016
Teknologi internet yang berkembang pesat, menyebabkan meningkatnya jumlah konten multimedia pada lalu lintas jaringan data. Content Centric Network (CCN) dengan fitur yang dimilikinya yaitu content distribution, multicast, in-network cache, mobility dan ...
Arief Prasetyo   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy