Showing 9,101 - 9,120 results of 9,723 for search '"Architecture"', query time: 0.07s Refine Results
  1. 9101

    MMFW-UAV dataset: multi-sensor and multi-view fixed-wing UAV dataset for air-to-air vision tasks by Yang Liu, Zhihao Sun, Lele Xi, Lele Zhang, Wei Dong, Chen Chen, Maobin Lu, Hailing Fu, Fang Deng

    Published 2025-01-01
    “…Several mainstream deep learning-based object detection architectures are evaluated on MMFW-UAV and the experimental results demonstrate that MMFW-UAV can be utilized for fixed-wing UAV identification, detection, and monitoring. …”
    Get full text
    Article
  2. 9102

    Advancements in Physics-Informed Neural Networks for Laminated Composites: A Comprehensive Review by Salman Khalid, Muhammad Haris Yazdani, Muhammad Muzammil Azad, Muhammad Umar Elahi, Izaz Raouf, Heung Soo Kim

    Published 2024-12-01
    “…PINNs address these issues by embedding governing physical laws directly into neural network architectures, enabling efficient and accurate modeling. …”
    Get full text
    Article
  3. 9103

    Multi-tenant computing network resource allocation algorithm based on deep reinforcement learning by HU Yuxiang, FENG Xu, DONG Yongji, HE Mengyang, ZHUANG Lei, SONG Yanrui

    Published 2024-12-01
    “…With the rapid advancement of intelligent businesses, the pre-existing relationship between traditional network architectures and computing capabilities has made it difficult to meet the current demands, making the implementation of computing-network convergence inevitable. …”
    Get full text
    Article
  4. 9104

    Parasismique, oser éprouver l’acceptabilité sociale by Stéphane Cartier, Cloé Vallette

    Published 2016-05-01
    “…Anti-seismic technologies in housing impose a zoning of seismic hazard to graduate architectural constraints according to the probability of shakes. …”
    Get full text
    Article
  5. 9105

    Artificial Intelligence vs. Human: Decoding Text Authenticity with Transformers by Daniela Gifu, Covaci Silviu-Vasile

    Published 2025-01-01
    “…Methodologically, we fine-tuned several transformer architectures, including BERT, RoBERTa, and DistilBERT, on this dataset to distinguish between human-written and AI-generated text. …”
    Get full text
    Article
  6. 9106

    Survey of network-layer anonymous communication protocols by Liangmin WANG, Xiaoling NI, Hui ZHAO

    Published 2020-02-01
    “…An anonymous communication system is an overlay network built on the application layer and combining various privacy protection technologies such as data forwarding,content encryption,and traffic obfuscation to hide communication relationships between entities and forwarded contents.However,there is a deficiency in the balance between performance and security as an anonymous communication system operating over an overlay network.With the advance of the future internet architectures,it is possible to build an infrastructure-based anonymous communication system.Such anonymous communication systems design anonymity as network infrastructure services and provide encryption operations for routers,which can solve the part problem of scalability and performance limitations of anonymous network.They can also be called network-layer anonymous communication protocols.The existing network-layer anonymous communication protocols (LAP,Dovetail,Hornet,PHI and Taranet) were studied.The classification standard of network-layer anonymous communication protocols were introduced.Its innovation point and specific encryption ideas were briefly described,and how to keep balance between security and performance was analyzed.The shortcomings and advantages of these kinds of network anonymous communication protocols were also pointed out.Finally,the challenges faced in the development of anonymous communication systems and the problems that need to be studied in depth were proposed.…”
    Get full text
    Article
  7. 9107

    Tailoring the shell structures in core-shell metal nanostructures for improved catalytic reduction of nitroaromatics by Manickam Sundarapandi, Alagarsamy Pandikumar, Perumal Rameshkumar, Ramasamy Ramaraj

    Published 2025-03-01
    “…Initially, recent contributions to the synthesis of diverse bimetallic nanostructures, including hollow, crown-jewel, alloy, and core-shell architectures are summarized. Subsequently, the influence of tailoring metal shells, including monolayer, bilayer, and alloy layer metal shells on core metals, on the catalytic activity of nitroaromatics is discussed. …”
    Get full text
    Article
  8. 9108

    Cultivating Slow Curating in Times of Acceleration by Alice Semedo, Fabiana Dicuonzo

    Published 2025-01-01
    “…Through heritage criticality, we will investigate territory interpretation and intervention examples that adopt disruptive, cross-, inter-, and trans-disciplinary approaches, including artistic, architectural, urban, performative, and curatorial practice, as effects and methods of slow curating taken as a public activity. …”
    Get full text
    Article
  9. 9109

    Exploring Online Synthesis for CGRAs with Specialized Operator Sets by Stefan Döbrich, Christian Hochberger

    Published 2011-01-01
    “…We believe that online synthesis that takes place during the execution of an application is one way to broaden the applicability of reconfigurable architectures as no expert knowledge of synthesis and technologies is required. …”
    Get full text
    Article
  10. 9110

    Construction of Internet of things trusted group based on multidimensional attribute trust model by Jinghan Chen, Bei Gong, Yubo Wang, Yu Zhang

    Published 2021-01-01
    “…The construction of trusted groups provides an architectural foundation for the application of group signature that maintains low network overhead. …”
    Get full text
    Article
  11. 9111

    A Survey on IoT Task Offloading Decisions in Multi-access Edge Computing: A Decision Content Perspective by Wang Dayong, Kamalrulnizam Bin Abu Bakar, Babangida Isyaku

    Published 2023-12-01
    “…This study investigates the similarities and differences between the enabling technologies, deployment architectures, and decision items of various decision mechanisms from the perspective of offloading decision content. …”
    Get full text
    Article
  12. 9112

    Explainable Security Requirements Classification Through Transformer Models by Luca Petrillo, Fabio Martinelli, Antonella Santone, Francesco Mercaldo

    Published 2025-01-01
    “…In addition, we employ few-shot learning techniques by leveraging transfer learning models, explicitly utilizing pre-trained architectures. The study demonstrates that these models can effectively classify security requirements with reasonable accuracy, precision, recall, and F1-score, demonstrating that the fine-tuning and SetFit can help smaller models generalize, making them suitable for enhancing security processes in the Software Development Cycle. …”
    Get full text
    Article
  13. 9113

    Engineering 2D spin networks by on-surface encapsulation of azafullerene radicals in nanotemplates by Gregor Kladnik, Luca Schio, Gregor Bavdek, Yuri Tanuma, Marion van Midden Mavrič, Erik Zupanič, Bastien Anézo, Ioanna K. Sideri, Nikos Tagmatarchis, Jannis Volkmann, Hermann A. Wegner, Andrea Goldoni, Christopher P. Ewels, Alberto Morgante, Luca Floreano, Denis Arčon, Dean Cvetko

    Published 2025-01-01
    “…Azafullerene encapsulation by nanohoops represents a viable realization of molecular spin protection while simultaneously demonstrating exceptional self-assembling properties by which large-scale 2D architectures of molecular spins can be realized.…”
    Get full text
    Article
  14. 9114

    Innovative Driver Monitoring Systems and On-Board-Vehicle Devices in a Smart-Road Scenario Based on the Internet of Vehicle Paradigm: A Literature and Commercial Solutions Overview by Paolo Visconti, Giuseppe Rausa, Carolina Del-Valle-Soto, Ramiro Velázquez, Donato Cafagna, Roberto De Fazio

    Published 2025-01-01
    “…The paper describes vehicle condition monitoring architectures, including diagnostic solutions for identifying anomalies, malfunctions, and instability while driving on slippery or wet roads. …”
    Get full text
    Article
  15. 9115

    IMAGES OF THE PAST AND THE PRESENT IN RUSSIAN UNIVERSITY MUSEUMS by Marina A. Vasilieva

    Published 2023-12-01
    “…Their developed interiors use such ancient images as architectural details and images of ancient philosophers, which was common for the 18th-19th century. …”
    Get full text
    Article
  16. 9116

    A Critical Review on the Reconstruction of the Manouchehri House in Kashan by Mitra Azad, Rafee Darsouei

    Published 2021-07-01
    “…Historic houses are the most remnants of Iran's architectural heritage, the multiplicity and diversity of that in historical contexts provide good potential as urban catalysts. …”
    Get full text
    Article
  17. 9117

    A review on challenges and future of green charging networks for zero emission electric transportation by Ijaz Ahmed, Muhammad Maaruf, Amjad Ali, Mohammad AlMuhaini, Muhammad Khalid

    Published 2025-01-01
    “…Using independent and interlinked mathematical models, authors examine contemporary computational approaches that manage corporate architectural challenges in novel manners. The aim of this work is to investigate potential avenues for future research, with a focus on attaining sustainable mobility while also promoting the intelligent advancement of microgrids. …”
    Get full text
    Article
  18. 9118

    Du surveillant général cerné par les murs au conseiller principal d’éducation, passeur de frontières by Christine Focquenoy

    Published 2019-03-01
    “…They reveal a daily life confined by architectural, symbolical and hierarchal walls. The wall metaphorically reflects the educational relationship. …”
    Get full text
    Article
  19. 9119

    The use of metonymy and metaphor in descriptive essays by intermediate and advanced EFL students by Oleksandr Kapranov

    Published 2017-12-01
    “…The participants and their respective controls were given five pictorial stimuli containing famous architectural landmarks in Sweden. The participants and the control group were instructed to write a one paragraph descriptive essay about each pictorial stimulus using either i) an imaginary and creative approach or ii) a non-imaginary and purely descriptive approach. …”
    Get full text
    Article
  20. 9120

    Characterizing Grover search algorithm on large-scale superconducting quantum computers by Muhammad AbuGhanem

    Published 2025-01-01
    “…Here, we report results for the implementation and characterization of a three-qubit Grover search algorithm using the state-of-the-art scalable quantum computing technology of superconducting quantum architectures. To delve into the algorithm’s scalability and performance metrics, our investigation spans the execution of the algorithm across all eight conceivable single-result oracles, alongside nine two-result oracles, employing IBM Quantum’s 127-qubit quantum computers. …”
    Get full text
    Article