Results 201 to 210 of about 125,349 (288)
Federated learning with enhanced cryptographic security for vehicular cyber-physical systems. [PDF]
Babbar H, Rani S, Shabaz M.
europepmc +1 more source
Centralized Hierarchical Coded Caching Scheme for Two-Layer Network. [PDF]
Zhao K, Wang J, Cheng M.
europepmc +1 more source
Where user devices include cell phones, tablets, laptops, and so on, which communicate with edge computing servers and use computational as well as storage resources provided by edge computing. Network connectivity is the core component of edge computing, which allows communication between mobile devices and edge computing nodes.
Genlian Zhang
wiley +1 more source
Advancements in cache management: a review of machine learning innovations for enhanced performance and security. [PDF]
Krishna K.
europepmc +1 more source
Application of Embodied Intelligence in Intelligent Warehousing and Logistics Scenarios
Embodied intelligence (EI) enhances digital platform efficiency in intelligent logistics, reducing transportation costs, improving throughput by 37.5%, and lowering energy consumption. EI‐driven improvements lead to discriminatory pricing strategies, while lightweight encryption ensures minimal performance overhead, maintaining real‐time operations ...
Jun Zhang, Chuan Zhang, Mingtao Zhang
wiley +1 more source
Energy-Efficient Aerial STAR-RIS-Aided Computing Offloading and Content Caching for Wireless Sensor Networks. [PDF]
Yang X, Wang Q, Yang B, Cao X.
europepmc +1 more source
Autonomous planetary rovers operate in GPS‐denied, low‐texture, crater‐rich environments where traditional SLAM‐based navigation systems suffer from localization drift and unreliable obstacle handling. To address these challenges, this work proposes a Space‐ROS–based autonomous navigation framework integrating ROS2 with the NAV2 stack, RTAB‐Map visual ...
Imnul Haque Ruman Talukder +5 more
wiley +1 more source
Enhancing adverse drug reaction data quality in Canada: A high-precision pipeline for medication name standardization and enrichment. [PDF]
Chalabianloo N +5 more
europepmc +1 more source
A pruning evaluation function was designed based on risk entropy weights, objectively weighting various entrepreneurial risk factors through the entropy weighting method to achieve quantitative integration of entrepreneurial risks, while controlling risk assessment errors within 5%.
Lu Gao, Renjia Zhang
wiley +1 more source

