2020 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon) 2020
DOI: 10.1109/fareastcon50210.2020.9271369
|View full text |Cite
|
Sign up to set email alerts
|

Software Development for Placing Tiles in Two-Dimensional Space

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 31 publications
(12 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…Furthermore, 5G's robust connectivity framework is crucial for the expansive growth of the Internet of Things (IoT), supporting the seamless integration of billions of devices and sensors across various ecosystems. This connectivity is instrumental in advancing smart city initiatives, where 5G can improve public services, enhance safety, and reduce environmental footprints through optimized traffic management, energy usage, and more [34,35].…”
Section: Advancements and Opportunities Afforded By 5g In Mobile Networkmentioning
confidence: 99%
“…Furthermore, 5G's robust connectivity framework is crucial for the expansive growth of the Internet of Things (IoT), supporting the seamless integration of billions of devices and sensors across various ecosystems. This connectivity is instrumental in advancing smart city initiatives, where 5G can improve public services, enhance safety, and reduce environmental footprints through optimized traffic management, energy usage, and more [34,35].…”
Section: Advancements and Opportunities Afforded By 5g In Mobile Networkmentioning
confidence: 99%
“…Machine learning models based on neural networks can analyze existing code to identify parallelization opportunities. They can then automatically generate optimal code tailored to the specific architecture of the computing system, thus easing the workload on developers and enhancing efficiency [27].…”
Section: Exploring Ai Approaches In Parallel Programmingmentioning
confidence: 99%
“…Parallel processes can exchange data in a manner where covert communication between them becomes an integral part of the confidentiality preservation method. Such an approach necessitates crafting mechanisms [21] for the secure and concealed exchange of messages between processes and coordinating their actions in ways that guarantee both the efficiency and confidentiality of the transmitted data [22].…”
Section: The Role Of Parallel Computing In Steganographymentioning
confidence: 99%