期刊文献+
共找到10,137篇文章
< 1 2 250 >
每页显示 20 50 100
Back-gate-tuned organic electrochemical transistor with temporal dynamic modulation for reservoir computing
1
作者 Qian Xu Jie Qiu +6 位作者 Mengyang Liu Dongzi Yang Tingpan Lan Jie Cao Yingfen Wei Hao Jiang Ming Wang 《Journal of Semiconductors》 2026年第1期118-123,共6页
Organic electrochemical transistor(OECT)devices demonstrate great promising potential for reservoir computing(RC)systems,but their lack of tunable dynamic characteristics limits their application in multi-temporal sca... Organic electrochemical transistor(OECT)devices demonstrate great promising potential for reservoir computing(RC)systems,but their lack of tunable dynamic characteristics limits their application in multi-temporal scale tasks.In this study,we report an OECT-based neuromorphic device with tunable relaxation time(τ)by introducing an additional vertical back-gate electrode into a planar structure.The dual-gate design enablesτreconfiguration from 93 to 541 ms.The tunable relaxation behaviors can be attributed to the combined effects of planar-gate induced electrochemical doping and back-gateinduced electrostatic coupling,as verified by electrochemical impedance spectroscopy analysis.Furthermore,we used theτ-tunable OECT devices as physical reservoirs in the RC system for intelligent driving trajectory prediction,achieving a significant improvement in prediction accuracy from below 69%to 99%.The results demonstrate that theτ-tunable OECT shows a promising candidate for multi-temporal scale neuromorphic computing applications. 展开更多
关键词 neuromorphic computing reservoir computing OECT tunable dynamics trajectory prediction
在线阅读 下载PDF
Multi-Objective Enhanced Cheetah Optimizer for Joint Optimization of Computation Offloading and Task Scheduling in Fog Computing
2
作者 Ahmad Zia Nazia Azim +5 位作者 Bekarystankyzy Akbayan Khalid J.Alzahrani Ateeq Ur Rehman Faheem Ullah Khan Nouf Al-Kahtani Hend Khalid Alkahtani 《Computers, Materials & Continua》 2026年第3期1559-1588,共30页
The cloud-fog computing paradigm has emerged as a novel hybrid computing model that integrates computational resources at both fog nodes and cloud servers to address the challenges posed by dynamic and heterogeneous c... The cloud-fog computing paradigm has emerged as a novel hybrid computing model that integrates computational resources at both fog nodes and cloud servers to address the challenges posed by dynamic and heterogeneous computing networks.Finding an optimal computational resource for task offloading and then executing efficiently is a critical issue to achieve a trade-off between energy consumption and transmission delay.In this network,the task processed at fog nodes reduces transmission delay.Still,it increases energy consumption,while routing tasks to the cloud server saves energy at the cost of higher communication delay.Moreover,the order in which offloaded tasks are executed affects the system’s efficiency.For instance,executing lower-priority tasks before higher-priority jobs can disturb the reliability and stability of the system.Therefore,an efficient strategy of optimal computation offloading and task scheduling is required for operational efficacy.In this paper,we introduced a multi-objective and enhanced version of Cheeta Optimizer(CO),namely(MoECO),to jointly optimize the computation offloading and task scheduling in cloud-fog networks to minimize two competing objectives,i.e.,energy consumption and communication delay.MoECO first assigns tasks to the optimal computational nodes and then the allocated tasks are scheduled for processing based on the task priority.The mathematical modelling of CO needs improvement in computation time and convergence speed.Therefore,MoECO is proposed to increase the search capability of agents by controlling the search strategy based on a leader’s location.The adaptive step length operator is adjusted to diversify the solution and thus improves the exploration phase,i.e.,global search strategy.Consequently,this prevents the algorithm from getting trapped in the local optimal solution.Moreover,the interaction factor during the exploitation phase is also adjusted based on the location of the prey instead of the adjacent Cheetah.This increases the exploitation capability of agents,i.e.,local search capability.Furthermore,MoECO employs a multi-objective Pareto-optimal front to simultaneously minimize designated objectives.Comprehensive simulations in MATLAB demonstrate that the proposed algorithm obtains multiple solutions via a Pareto-optimal front and achieves an efficient trade-off between optimization objectives compared to baseline methods. 展开更多
关键词 Computation offloading task scheduling cheetah optimizer fog computing optimization resource allocation internet of things
在线阅读 下载PDF
Quantum Secure Multiparty Computation:Bridging Privacy,Security,and Scalability in the Post-Quantum Era
3
作者 Sghaier Guizani Tehseen Mazhar Habib Hamam 《Computers, Materials & Continua》 2026年第4期1-25,共25页
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser... The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation. 展开更多
关键词 Quantum computing secure multiparty computation(MPC) post-quantum cryptography(PQC) quantum key distribution(QKD) privacy-preserving computation quantum homomorphic encryption quantum network security federated learning blockchain security quantum cryptography
在线阅读 下载PDF
A Multi-Objective Deep Reinforcement Learning Algorithm for Computation Offloading in Internet of Vehicles
4
作者 Junjun Ren Guoqiang Chen +1 位作者 Zheng-Yi Chai Dong Yuan 《Computers, Materials & Continua》 2026年第1期2111-2136,共26页
Vehicle Edge Computing(VEC)and Cloud Computing(CC)significantly enhance the processing efficiency of delay-sensitive and computation-intensive applications by offloading compute-intensive tasks from resource-constrain... Vehicle Edge Computing(VEC)and Cloud Computing(CC)significantly enhance the processing efficiency of delay-sensitive and computation-intensive applications by offloading compute-intensive tasks from resource-constrained onboard devices to nearby Roadside Unit(RSU),thereby achieving lower delay and energy consumption.However,due to the limited storage capacity and energy budget of RSUs,it is challenging to meet the demands of the highly dynamic Internet of Vehicles(IoV)environment.Therefore,determining reasonable service caching and computation offloading strategies is crucial.To address this,this paper proposes a joint service caching scheme for cloud-edge collaborative IoV computation offloading.By modeling the dynamic optimization problem using Markov Decision Processes(MDP),the scheme jointly optimizes task delay,energy consumption,load balancing,and privacy entropy to achieve better quality of service.Additionally,a dynamic adaptive multi-objective deep reinforcement learning algorithm is proposed.Each Double Deep Q-Network(DDQN)agent obtains rewards for different objectives based on distinct reward functions and dynamically updates the objective weights by learning the value changes between objectives using Radial Basis Function Networks(RBFN),thereby efficiently approximating the Pareto-optimal decisions for multiple objectives.Extensive experiments demonstrate that the proposed algorithm can better coordinate the three-tier computing resources of cloud,edge,and vehicles.Compared to existing algorithms,the proposed method reduces task delay and energy consumption by 10.64%and 5.1%,respectively. 展开更多
关键词 Deep reinforcement learning internet of vehicles multi-objective optimization cloud-edge computing computation offloading service caching
在线阅读 下载PDF
DRL-Based Cross-Regional Computation Offloading Algorithm
5
作者 Lincong Zhang Yuqing Liu +2 位作者 Kefeng Wei Weinan Zhao Bo Qian 《Computers, Materials & Continua》 2026年第1期901-918,共18页
In the field of edge computing,achieving low-latency computational task offloading with limited resources is a critical research challenge,particularly in resource-constrained and latency-sensitive vehicular network e... In the field of edge computing,achieving low-latency computational task offloading with limited resources is a critical research challenge,particularly in resource-constrained and latency-sensitive vehicular network environments where rapid response is mandatory for safety-critical applications.In scenarios where edge servers are sparsely deployed,the lack of coordination and information sharing often leads to load imbalance,thereby increasing system latency.Furthermore,in regions without edge server coverage,tasks must be processed locally,which further exacerbates latency issues.To address these challenges,we propose a novel and efficient Deep Reinforcement Learning(DRL)-based approach aimed at minimizing average task latency.The proposed method incorporates three offloading strategies:local computation,direct offloading to the edge server in local region,and device-to-device(D2D)-assisted offloading to edge servers in other regions.We formulate the task offloading process as a complex latency minimization optimization problem.To solve it,we propose an advanced algorithm based on the Dueling Double Deep Q-Network(D3QN)architecture and incorporating the Prioritized Experience Replay(PER)mechanism.Experimental results demonstrate that,compared with existing offloading algorithms,the proposed method significantly reduces average task latency,enhances user experience,and offers an effective strategy for latency optimization in future edge computing systems under dynamic workloads. 展开更多
关键词 Edge computing computational task offloading deep reinforcement learning D3QN device-to-device communication system latency optimization
在线阅读 下载PDF
A rectangular cross-section field-of-view rotational computed laminography and its analytical reconstruction method
6
作者 Xiang Zou Wu-Liang Shi +1 位作者 Mu-Ge Du Yu-Xiang Xing 《Nuclear Science and Techniques》 2026年第3期18-34,共17页
Rotational computed laminography(CL)has broad application potential in three-dimensional imaging of plate-like objects because it only requires X-rays to pass through the tested object in the thickness direction durin... Rotational computed laminography(CL)has broad application potential in three-dimensional imaging of plate-like objects because it only requires X-rays to pass through the tested object in the thickness direction during the imaging process.In this study,a rectangular cross-section field-of-view rotational CL(RC-CL)is proposed for circuit board imaging.Compared to other rotational CL systems,the field of view is the largest and most suitable for rectangular circuit boards.Meanwhile,as the imaging geometry of RC-CL is significantly different from that of cone-beam CT,the Feldkamp-Davis-Kress(FDK)reconstruction algorithm cannot be used directly.However,transferring the projection data to fit into the CBCT geometry using two-dimensional interpolation introduces interpolation errors.Therefore,an FDK-type analytical reconstruction algorithm applicable to RC-CL was developed.The effectiveness of the method was validated through numerical experiments,and the influence of the tilt angle on the reconstruction results was analyzed.Finally,the RC-CL technique was applied to real defect detection research on circuit boards. 展开更多
关键词 Computed tomography(CT) Computed laminography(CL) Field of view FDK Analytical reconstruction
在线阅读 下载PDF
Virtual QPU:A Novel Implementation of Quantum Computing
7
作者 Danyang Zheng Jinchen Xv +1 位作者 Xin Zhou Zheng Shan 《Computers, Materials & Continua》 2026年第4期1008-1029,共22页
The increasing popularity of quantum computing has resulted in a considerable rise in demand for cloud quantum computing usage in recent years.Nevertheless,the rapid surge in demand for cloud-based quantum computing r... The increasing popularity of quantum computing has resulted in a considerable rise in demand for cloud quantum computing usage in recent years.Nevertheless,the rapid surge in demand for cloud-based quantum computing resources has led to a scarcity.In order to meet the needs of an increasing number of researchers,it is imperative to facilitate efficient and flexible access to computing resources in a cloud environment.In this paper,we propose a novel quantum computing paradigm,Virtual QPU(VQPU),which addresses this issue and enhances quantum cloud throughput with guaranteed circuit fidelity.The proposal introduces three innovative concepts:(1)The integration of virtualization technology into the field of quantum computing to enhance quantum cloud throughput.(2)The introduction of an asynchronous execution of circuits methodology to improve quantum computing flexibility.(3)The development of a virtual QPU allocation scheme for quantum tasks in a cloud environment to improve circuit fidelity.The concepts have been validated through the utilization of a self-built simulated quantum cloud platform. 展开更多
关键词 Quantum computing scheduling parallel computing computational paradigm
在线阅读 下载PDF
Energy Aware Task Scheduling of IoT Application Using a Hybrid Metaheuristic Algorithm in Cloud Computing
8
作者 Ahmed Awad Mohamed Eslam Abdelhakim Seyam +4 位作者 Ahmed R.Elsaeed Laith Abualigah Aseel Smerat Ahmed M.AbdelMouty Hosam E.Refaat 《Computers, Materials & Continua》 2026年第3期1786-1803,共18页
In recent years,fog computing has become an important environment for dealing with the Internet of Things.Fog computing was developed to handle large-scale big data by scheduling tasks via cloud computing.Task schedul... In recent years,fog computing has become an important environment for dealing with the Internet of Things.Fog computing was developed to handle large-scale big data by scheduling tasks via cloud computing.Task scheduling is crucial for efficiently handling IoT user requests,thereby improving system performance,cost,and energy consumption across nodes in cloud computing.With the large amount of data and user requests,achieving the optimal solution to the task scheduling problem is challenging,particularly in terms of cost and energy efficiency.In this paper,we develop novel strategies to save energy consumption across nodes in fog computing when users execute tasks through the least-cost paths.Task scheduling is developed using modified artificial ecosystem optimization(AEO),combined with negative swarm operators,Salp Swarm Algorithm(SSA),in order to competitively optimize their capabilities during the exploitation phase of the optimal search process.In addition,the proposed strategy,Enhancement Artificial Ecosystem Optimization Salp Swarm Algorithm(EAEOSSA),attempts to find the most suitable solution.The optimization that combines cost and energy for multi-objective task scheduling optimization problems.The backpack problem is also added to improve both cost and energy in the iFogSim implementation as well.A comparison was made between the proposed strategy and other strategies in terms of time,cost,energy,and productivity.Experimental results showed that the proposed strategy improved energy consumption,cost,and time over other algorithms.Simulation results demonstrate that the proposed algorithm increases the average cost,average energy consumption,and mean service time in most scenarios,with average reductions of up to 21.15%in cost and 25.8%in energy consumption. 展开更多
关键词 Energy-efficient tasks internet of things(IoT) cloud fog computing artificial ecosystem-based optimization salp swarm algorithm cloud computing
在线阅读 下载PDF
Two-Dimensional MXene-Based Advanced Sensors for Neuromorphic Computing Intelligent Application
9
作者 Lin Lu Bo Sun +2 位作者 Zheng Wang Jialin Meng Tianyu Wang 《Nano-Micro Letters》 2026年第2期664-691,共28页
As emerging two-dimensional(2D)materials,carbides and nitrides(MXenes)could be solid solutions or organized structures made up of multi-atomic layers.With remarkable and adjustable electrical,optical,mechanical,and el... As emerging two-dimensional(2D)materials,carbides and nitrides(MXenes)could be solid solutions or organized structures made up of multi-atomic layers.With remarkable and adjustable electrical,optical,mechanical,and electrochemical characteristics,MXenes have shown great potential in brain-inspired neuromorphic computing electronics,including neuromorphic gas sensors,pressure sensors and photodetectors.This paper provides a forward-looking review of the research progress regarding MXenes in the neuromorphic sensing domain and discussed the critical challenges that need to be resolved.Key bottlenecks such as insufficient long-term stability under environmental exposure,high costs,scalability limitations in large-scale production,and mechanical mismatch in wearable integration hinder their practical deployment.Furthermore,unresolved issues like interfacial compatibility in heterostructures and energy inefficiency in neu-romorphic signal conversion demand urgent attention.The review offers insights into future research directions enhance the fundamental understanding of MXene properties and promote further integration into neuromorphic computing applications through the convergence with various emerging technologies. 展开更多
关键词 TWO-DIMENSIONAL MXenes SENSOR Neuromorphic computing Multimodal intelligent system Wearable electronics
在线阅读 下载PDF
Three-dimensional characterization of intermetallic compound formation in magnesium alloys with micro X-ray computed tomography
10
作者 SUN Wei HU Xiao-juan +5 位作者 DENG Yang-chao YANG Yang YAO Hu ZHANG Yong-hong ZHANG Rui-feng ZENG Guang 《Journal of Central South University》 2026年第1期160-174,共15页
This comprehensive study investigates the formation and evolution of intermetallic compounds during the solidification process of magnesium alloys using advanced micro X-ray computed tomography.By analyzing both commo... This comprehensive study investigates the formation and evolution of intermetallic compounds during the solidification process of magnesium alloys using advanced micro X-ray computed tomography.By analyzing both common industrial Mg-Al-Zn alloys and a novel rare earth-containing Mg-Ni-Gd-Y alloy,we aim to characterize the nucleation,growth,and distribution of Al-Mn and eutectic intermetallics across various stages of solidification.The non destructive imaging technique employed in this research provides high-resolution,three-dimensional insights into the microstructural development,allowing for a detailed examination of the morphology,spatial arrangement,and interconnectivity of intermetallic phases.This approach overcomes limitations of traditional two-dimensional metallographic methods,offering a more comprehensive understanding of the complex three-dimensional structures formed during solidification. 展开更多
关键词 magnesium alloy X-ray computed tomography SOLIDIFICATION INTERMETALLICS DEFECTS
在线阅读 下载PDF
IoT-Assisted Cloud Data Sharing with Revocation and Equality Test under Identity-Based Proxy Re-Encryption
11
作者 Han-Yu Lin Tung-Tso Tsai Yi-Chuan Wang 《Computers, Materials & Continua》 2026年第3期431-447,共17页
Cloud services,favored by many enterprises due to their high flexibility and easy operation,are widely used for data storage and processing.However,the high latency,together with transmission overheads of the cloud ar... Cloud services,favored by many enterprises due to their high flexibility and easy operation,are widely used for data storage and processing.However,the high latency,together with transmission overheads of the cloud architecture,makes it difficult to quickly respond to the demands of IoT applications and local computation.To make up for these deficiencies in the cloud,fog computing has emerged as a critical role in the IoT applications.It decentralizes the computing power to various lower nodes close to data sources,so as to achieve the goal of low latency and distributed processing.With the data being frequently exchanged and shared between multiple nodes,it becomes a challenge to authorize data securely and efficiently while protecting user privacy.To address this challenge,proxy re-encryption(PRE)schemes provide a feasible way allowing an intermediary proxy node to re-encrypt ciphertext designated for different authorized data requesters without compromising any plaintext information.Since the proxy is viewed as a semi-trusted party,it should be taken to prevent malicious behaviors and reduce the risk of data leakage when implementing PRE schemes.This paper proposes a new fog-assisted identity-based PRE scheme supporting anonymous key generation,equality test,and user revocation to fulfill various IoT application requirements.Specifically,in a traditional identity-based public key architecture,the key escrow problem and the necessity of a secure channel are major security concerns.We utilize an anonymous key generation technique to solve these problems.The equality test functionality further enables a cloud server to inspect whether two candidate trapdoors contain an identical keyword.In particular,the proposed scheme realizes fine-grained user-level authorization while maintaining strong key confidentiality.To revoke an invalid user identity,we add a revocation list to the system flows to restrict access privileges without increasing additional computation cost.To ensure security,it is shown that our system meets the security notion of IND-PrID-CCA and OW-ID-CCA under the Decisional Bilinear Diffie-Hellman(DBDH)assumption. 展开更多
关键词 Equality test proxy re-encryption IDENTITY-BASED REVOCABLE fog computing
在线阅读 下载PDF
《CT理论与应用研究(中英文)》约稿函
12
《CT理论与应用研究(中英文)》 2026年第1期I0001-I0001,共1页
计算机断层成像(Computed Tomography,CT)是一种计算成像技术,是在不破坏物体结构的前提下,根据分布在物体外围发射源和接收器的记录数据,运用一定的数学方法,通过计算机处理,重建物体特定层面上的断层图像,从而获得物体内部信息。CT已... 计算机断层成像(Computed Tomography,CT)是一种计算成像技术,是在不破坏物体结构的前提下,根据分布在物体外围发射源和接收器的记录数据,运用一定的数学方法,通过计算机处理,重建物体特定层面上的断层图像,从而获得物体内部信息。CT已在医学、工业、地球物理、考古、安检等领域得到了广泛的应用。 展开更多
关键词 计算成像技术 重建 Computed Tomography CT
原文传递
High-Entropy Oxide Memristors for Neuromorphic Computing:From Material Engineering to Functional Integration
13
作者 Jia‑Li Yang Xin‑Gui Tang +4 位作者 Xuan Gu Qi‑Jun Sun Zhen‑Hua Tang Wen‑Hua Li Yan-Ping Jiang 《Nano-Micro Letters》 2026年第2期138-169,共32页
High-entropy oxides(HEOs)have emerged as a promising class of memristive materials,characterized by entropy-stabilized crystal structures,multivalent cation coordination,and tunable defect landscapes.These intrinsic f... High-entropy oxides(HEOs)have emerged as a promising class of memristive materials,characterized by entropy-stabilized crystal structures,multivalent cation coordination,and tunable defect landscapes.These intrinsic features enable forming-free resistive switching,multilevel conductance modulation,and synaptic plasticity,making HEOs attractive for neuromorphic computing.This review outlines recent progress in HEO-based memristors across materials engineering,switching mechanisms,and synaptic emulation.Particular attention is given to vacancy migration,phase transitions,and valence-state dynamics—mechanisms that underlie the switching behaviors observed in both amorphous and crystalline systems.Their relevance to neuromorphic functions such as short-term plasticity and spike-timing-dependent learning is also examined.While encouraging results have been achieved at the device level,challenges remain in conductance precision,variability control,and scalable integration.Addressing these demands a concerted effort across materials design,interface optimization,and task-aware modeling.With such integration,HEO memristors offer a compelling pathway toward energy-efficient and adaptable brain-inspired electronics. 展开更多
关键词 High-entropy oxides MEMRISTORS Neuromorphic computing Configurational entropy Resistive switching
在线阅读 下载PDF
A Cloud-Based Distributed System for Story Visualization Using Stable Diffusion
14
作者 Chuang-Chieh Lin Yung-Shen Huang Shih-Yeh Chen 《Computers, Materials & Continua》 2026年第2期1751-1769,共19页
With the rapid development of generative artificial intelligence(GenAI),the task of story visualization,which transforms natural language narratives into coherent and consistent image sequences,has attracted growing r... With the rapid development of generative artificial intelligence(GenAI),the task of story visualization,which transforms natural language narratives into coherent and consistent image sequences,has attracted growing research attention.However,existing methods still face limitations in balancing multi-frame character consistency and generation efficiency,which restricts their feasibility for large-scale practical applications.To address this issue,this study proposes a modular cloud-based distributed system built on Stable Diffusion.By separating the character generation and story generation processes,and integratingmulti-feature control techniques,a cachingmechanism,and an asynchronous task queue architecture,the system enhances generation efficiency and scalability.The experimental design includes both automated and human evaluations of character consistency,performance testing,and multinode simulation.The results show that the proposed system outperforms the baseline model StoryGen in both CLIP-I and human evaluation metrics.In terms of performance,under the experimental environment of this study,dual-node deployment reduces average waiting time by approximately 19%,while the four-node simulation further reduces it by up to 65%.Overall,this study demonstrates the advantages of cloud-distributed GenAI in maintaining character consistency and reducing generation latency,highlighting its potential value inmulti-user collaborative story visualization applications. 展开更多
关键词 Stable diffusion story visualization generativeAI distributed computing cloud-based system character consistency
在线阅读 下载PDF
MDMOSA:Multi-Objective-Oriented Dwarf Mongoose Optimization for Cloud Task Scheduling
15
作者 Olanrewaju Lawrence Abraham Md Asri Ngadi +1 位作者 Johan Bin Mohamad Sharif Mohd Kufaisal Mohd Sidik 《Computers, Materials & Continua》 2026年第3期2062-2096,共35页
Task scheduling in cloud computing is a multi-objective optimization problem,often involving conflicting objectives such as minimizing execution time,reducing operational cost,and maximizing resource utilization.Howev... Task scheduling in cloud computing is a multi-objective optimization problem,often involving conflicting objectives such as minimizing execution time,reducing operational cost,and maximizing resource utilization.However,traditional approaches frequently rely on single-objective optimization methods which are insufficient for capturing the complexity of such problems.To address this limitation,we introduce MDMOSA(Multi-objective Dwarf Mongoose Optimization with Simulated Annealing),a hybrid that integrates multi-objective optimization for efficient task scheduling in Infrastructure-as-a-Service(IaaS)cloud environments.MDMOSA harmonizes the exploration capabilities of the biologically inspired Dwarf Mongoose Optimization(DMO)with the exploitation strengths of Simulated Annealing(SA),achieving a balanced search process.The algorithm aims to optimize task allocation by reducing makespan and financial cost while improving system resource utilization.We evaluate MDMOSA through extensive simulations using the real-world Google Cloud Jobs(GoCJ)dataset within the CloudSim environment.Comparative analysis against benchmarked algorithms such as SMOACO,MOTSGWO,and MFPAGWO reveals that MDMOSA consistently achieves superior performance in terms of scheduling efficiency,cost-effectiveness,and scalability.These results confirm the potential of MDMOSA as a robust and adaptable solution for resource scheduling in dynamic and heterogeneous cloud computing infrastructures. 展开更多
关键词 Cloud computing MULTI-OBJECTIVE task scheduling dwarf mongoose optimization METAHEURISTIC
在线阅读 下载PDF
Multisensory Neuromorphic Devices:From Physics to Integration
16
作者 An Gui Haoran Mu +2 位作者 Rong Yang Guangyu Zhang Shenghuang Lin 《Nano-Micro Letters》 2026年第4期263-316,共54页
The increasing complexity of intelligent sensing environments,driven by the growth of Internet of Things technologies,has created a strong demand for neuromorphic systems capable of real-time,low-power multisensory pe... The increasing complexity of intelligent sensing environments,driven by the growth of Internet of Things technologies,has created a strong demand for neuromorphic systems capable of real-time,low-power multisensory perception.Traditional sensory architectures,constrained by single-modal processing and centralized computing,struggle to meet the requirements of diverse and dynamic input conditions.Multisensory neuromorphic devices offer a promising solution by mimicking the distributed,event-driven processing of biological systems.Recent efforts have explored synaptic devices and material systems that respond to various input modalities,including visual,tactile,thermal,and chemical stimuli.However,challenges remain in signal conversion,encoding compatibility,and the fusion of heterogeneous inputs without loss of unisensory information.This review provides a comprehensive overview of the physical mechanisms,device behaviors,and integration strategies that underpin signal processing in neuromorphic hardware.We highlight synaptic mechanisms conducive to cross-modal interaction,analyze representative signal fusion approaches at the device level,and discuss future directions for constructing efficient,scalable,and biologically inspired multisensory neuromorphic systems. 展开更多
关键词 Neuromorphic computing Multisensory signals Physical mechanism Multisensory fusion SYNAPSE
在线阅读 下载PDF
Mechanical Properties Analysis of Flexible Memristors for Neuromorphic Computing
17
作者 Zhenqian Zhu Jiheng Shui +1 位作者 Tianyu Wang Jialin Meng 《Nano-Micro Letters》 2026年第1期53-79,共27页
The advancement of flexible memristors has significantly promoted the development of wearable electronic for emerging neuromorphic computing applications.Inspired by in-memory computing architecture of human brain,fle... The advancement of flexible memristors has significantly promoted the development of wearable electronic for emerging neuromorphic computing applications.Inspired by in-memory computing architecture of human brain,flexible memristors exhibit great application potential in emulating artificial synapses for highefficiency and low power consumption neuromorphic computing.This paper provides comprehensive overview of flexible memristors from perspectives of development history,material system,device structure,mechanical deformation method,device performance analysis,stress simulation during deformation,and neuromorphic computing applications.The recent advances in flexible electronics are summarized,including single device,device array and integration.The challenges and future perspectives of flexible memristor for neuromorphic computing are discussed deeply,paving the way for constructing wearable smart electronics and applications in large-scale neuromorphic computing and high-order intelligent robotics. 展开更多
关键词 Flexible memristor Neuromorphic computing Mechanical property Wearable electronics
在线阅读 下载PDF
Evolve and Revoke:A Secure and Efficient Conditional Proxy Re-Encryption Scheme with Ciphertext Evolution
18
作者 Han-Yu Lin Tung-Tso Tsai Yi-Jia Ye 《Computers, Materials & Continua》 2026年第4期1565-1583,共19页
Cloud data sharing is an important issue in modern times.To maintain the privacy and confidentiality of data stored in the cloud,encryption is an inevitable process before uploading the data.However,the centralized ma... Cloud data sharing is an important issue in modern times.To maintain the privacy and confidentiality of data stored in the cloud,encryption is an inevitable process before uploading the data.However,the centralized management and transmission latency of the cloud makes it difficult to support real-time processing and distributed access structures.As a result,fog computing and the Internet of Things(IoT)have emerged as crucial applications.Fog-assisted proxy re-encryption is a commonly adopted technique for sharing cloud ciphertexts.It allows a semitrusted proxy to transforma data owner’s ciphertext into another re-encrypted ciphertext intended for a data requester,without compromising any information about the original ciphertext.Yet,the user revocation and cloud ciphertext renewal problems still lack effective and secure mechanisms.Motivated by it,we propose a revocable conditional proxy re-encryption scheme offering ciphertext evolution(R-CPRE-CE).In particular,a periodically updated time key is used to revoke the user’s access privileges while an access condition prevents a malicious proxy from reencrypting unauthorized ciphertext.We also demonstrate that our scheme is provably secure under the notion of indistinguishability against adaptively chosen identity and chosen ciphertext attacks in the random oracle model.Performance analysis shows that our scheme reduces the computation time for a complete data access cycle from an initial query to the final decryption by approximately 47.05%compared to related schemes. 展开更多
关键词 REVOCABLE proxy re-encryption conditional access control ciphertext evolution fog computing
在线阅读 下载PDF
A Knowledge-Distilled CharacterBERT-BiLSTM-ATT Framework for Lightweight DGA Detection in IoT Devices
19
作者 Chengqi Liu YongtaoLi +1 位作者 Weiping Zou Deyu Lin 《Computers, Materials & Continua》 2026年第4期2049-2068,共20页
With the large-scale deployment of the Internet ofThings(IoT)devices,their weak securitymechanisms make them prime targets for malware attacks.Attackers often use Domain Generation Algorithm(DGA)to generate random dom... With the large-scale deployment of the Internet ofThings(IoT)devices,their weak securitymechanisms make them prime targets for malware attacks.Attackers often use Domain Generation Algorithm(DGA)to generate random domain names,hiding the real IP of Command and Control(C&C)servers to build botnets.Due to the randomness and dynamics of DGA,traditional methods struggle to detect them accurately,increasing the difficulty of network defense.This paper proposes a lightweight DGA detection model based on knowledge distillation for resource-constrained IoT environments.Specifically,a teacher model combining CharacterBERT,a bidirectional long short-term memory(BiLSTM)network,and attention mechanism(ATT)is constructed:it extracts character-level semantic features viaCharacterBERT,captures sequence dependencieswith the BiLSTM,and integrates theATT for key feature weighting,formingmulti-granularity feature fusion.An improved knowledge distillation approach transfers the teacher model’s learned knowledge to the simplified DistilBERT student model.Experimental results show the teacher model achieves 98.68%detection accuracy.The student modelmaintains slightly improved accuracy while significantly compressing parameters to approximately 38.4%of the teacher model’s scale,greatly reducing computational overhead for IoT deployment. 展开更多
关键词 IoT security DGA detection knowledge distillation lightweight model edge computing
在线阅读 下载PDF
A theory perspective of the polysulfide absorbing materials for room-temperature sodium-sulfur batteries
20
作者 Chhail Bihari Soni Vipin Kumar 《Journal of Energy Chemistry》 2026年第1期584-604,I0013,共22页
Though the formation of polysulfide is desirable,as it contributes to the capacity build-up,it must not leak into the electrolyte.The loss of polysulfide causes capacity fade,a change in the local chemistry of the ele... Though the formation of polysulfide is desirable,as it contributes to the capacity build-up,it must not leak into the electrolyte.The loss of polysulfide causes capacity fade,a change in the local chemistry of the electrolyte,and anode poisoning.Constant efforts are in progress to find suitable polysulfide-absorbing materials;however,the magical polysulfide absorber is yet to be discovered or developed.Experimental methods alone often fall short in accelerating the investigations may be due to the complex Nature of the testing.This review focuses on the importance of computational methods,particularly density functional theory(DFT),in screening suitable polysulfide absorbers.It highlights the critical role of anchoring materials in improving Na-S battery performance,including pristine and doped graphene,metal–organic frameworks,carbon Nanofibers,vanadium disulfide,MXenes,and metal sulfides.By examining adsorption energies,charge transfer mechanisms,and catalytic properties,this review provides insights into the design of advanced materials that can effectively immobilize polysulfides and enhance battery stability.The review aims to guide future research efforts toward the development of high-performance RT Na-S batteries through a comprehensive understanding of the polysulfide-absorbing materials. 展开更多
关键词 Na-S battery Computational theory Polysulfide absorbing materials DFT
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部