Intelligent machines as information and communication technology and their influence on sustainable marketing practices for beneficial impact on business …
Intelligent machines are the machines or devices that make use of artificial intelligence and
robotics technologies. It has the ability to accomplish a specific task in the presence of …
robotics technologies. It has the ability to accomplish a specific task in the presence of …
RAP-MEC: Robust authentication protocol for the mobile edge computing services
The emergence of edge computing has revolutionized the landscape of modern
applications, offering remarkable advantages such as low-latency and high-bandwidth …
applications, offering remarkable advantages such as low-latency and high-bandwidth …
Revolutionizing Thrust Manufacturing: The Synergy of Real-Time Data and AI Advancements
KR Senthilkumar - Using Real-Time Data and AI for Thrust …, 2024 - igi-global.com
This chapter explores the transformative impact of integrating real-time data and artificial
intelligence (AI) in the field of thrust manufacturing, particularly within the aerospace and …
intelligence (AI) in the field of thrust manufacturing, particularly within the aerospace and …
A Review on Cyber-Twin in Sixth Generation Wireless Networks: Architecture, Research Challenges & Issues
The concept of Cyber-twin (CT) in Sixth-Generation (6G) wireless technology represents a
transformative leap in the realm of telecommunication, integrating advanced Artificial …
transformative leap in the realm of telecommunication, integrating advanced Artificial …
Asynchronous Privacy-Preservation Federated Learning Method for Mobile Edge Network in Industrial Internet of Things Ecosystem
The typical industrial Internet of Things (IIoT) network system relies on a real-time data
upload for timely processing. However, the incidence of device heterogeneity, high network …
upload for timely processing. However, the incidence of device heterogeneity, high network …
Distributed Fog computing system for weapon detection and face recognition
Surveillance systems are very important to prevent situations where armed people appear.
To minimize human supervision, there are algorithms based on artificial intelligence that …
To minimize human supervision, there are algorithms based on artificial intelligence that …
[HTML][HTML] A Genetic Optimized Federated Learning Approach for Joint Consideration of End-to-End Delay and Data Privacy in Vehicular Networks
In 5G vehicular networks, two key challenges have become apparent, including end-to-end
delay minimization and data privacy. Learning-based approaches have been used to …
delay minimization and data privacy. Learning-based approaches have been used to …
RCFS: rate and cost fair CPU scheduling strategy in edge nodes
With the rapid advancement of 5G mobile networks and Internet of Things technology, an
increasing number of data-intensive applications are generating massive amounts of …
increasing number of data-intensive applications are generating massive amounts of …
A joint task caching and computation offloading scheme based on deep reinforcement learning
H Tian, L Zhu, L Tan - Peer-to-Peer Networking and Applications, 2025 - Springer
Considering the dynamic variability of the vehicular edge environment and the limited edge
servers resources, this paper proposes a joint task caching and computation offloading …
servers resources, this paper proposes a joint task caching and computation offloading …
Enhanced In-Network Caching for Deep Learning in Edge Networks
J Zhang, W Liu, L Zhang, J Tian - Electronics, 2024 - search.proquest.com
With the deep integration of communication technology and Internet of Things technology,
the edge network structure is becoming increasingly dense and heterogeneous. At the same …
the edge network structure is becoming increasingly dense and heterogeneous. At the same …