Suggested Topics within your search.
Suggested Topics within your search.
- Architecture 4
- Information technology 2
- Internet in public administration 2
- Public administration 2
- ARCHITECTURE / Design, Drafting, Drawing & Presentation 1
- ARCHITECTURE / General 1
- ARCHITECTURE / Reference 1
- ARCHITECTURE / Urban & Land Use Planning 1
- Anatomy of a project 1
- Ancient greek society 1
- Antiquities 1
- Architecture--Study and teaching (Graduate) 1
- Artificial Intelligence 1
- Artificial intelligence 1
- Bouwkunst 1
- Building 1
- Building materials 1
- Church buildings 1
- Collection and preservation 1
- Communication in architecture 1
- Communication policy 1
- Community development 1
- Conservation and restoration 1
- Cultural property 1
- Data Mining and Knowledge Discovery 1
- Data mining 1
- Dressmaking 1
- Economic development 1
- Electronic commerce 1
- Enterprise application integration (Computer systems) 1
-
9101
MMFW-UAV dataset: multi-sensor and multi-view fixed-wing UAV dataset for air-to-air vision tasks
Published 2025-01-01“…Several mainstream deep learning-based object detection architectures are evaluated on MMFW-UAV and the experimental results demonstrate that MMFW-UAV can be utilized for fixed-wing UAV identification, detection, and monitoring. …”
Get full text
Article -
9102
Advancements in Physics-Informed Neural Networks for Laminated Composites: A Comprehensive Review
Published 2024-12-01“…PINNs address these issues by embedding governing physical laws directly into neural network architectures, enabling efficient and accurate modeling. …”
Get full text
Article -
9103
Multi-tenant computing network resource allocation algorithm based on deep reinforcement learning
Published 2024-12-01“…With the rapid advancement of intelligent businesses, the pre-existing relationship between traditional network architectures and computing capabilities has made it difficult to meet the current demands, making the implementation of computing-network convergence inevitable. …”
Get full text
Article -
9104
Parasismique, oser éprouver l’acceptabilité sociale
Published 2016-05-01“…Anti-seismic technologies in housing impose a zoning of seismic hazard to graduate architectural constraints according to the probability of shakes. …”
Get full text
Article -
9105
Artificial Intelligence vs. Human: Decoding Text Authenticity with Transformers
Published 2025-01-01“…Methodologically, we fine-tuned several transformer architectures, including BERT, RoBERTa, and DistilBERT, on this dataset to distinguish between human-written and AI-generated text. …”
Get full text
Article -
9106
Survey of network-layer anonymous communication protocols
Published 2020-02-01“…An anonymous communication system is an overlay network built on the application layer and combining various privacy protection technologies such as data forwarding,content encryption,and traffic obfuscation to hide communication relationships between entities and forwarded contents.However,there is a deficiency in the balance between performance and security as an anonymous communication system operating over an overlay network.With the advance of the future internet architectures,it is possible to build an infrastructure-based anonymous communication system.Such anonymous communication systems design anonymity as network infrastructure services and provide encryption operations for routers,which can solve the part problem of scalability and performance limitations of anonymous network.They can also be called network-layer anonymous communication protocols.The existing network-layer anonymous communication protocols (LAP,Dovetail,Hornet,PHI and Taranet) were studied.The classification standard of network-layer anonymous communication protocols were introduced.Its innovation point and specific encryption ideas were briefly described,and how to keep balance between security and performance was analyzed.The shortcomings and advantages of these kinds of network anonymous communication protocols were also pointed out.Finally,the challenges faced in the development of anonymous communication systems and the problems that need to be studied in depth were proposed.…”
Get full text
Article -
9107
Tailoring the shell structures in core-shell metal nanostructures for improved catalytic reduction of nitroaromatics
Published 2025-03-01“…Initially, recent contributions to the synthesis of diverse bimetallic nanostructures, including hollow, crown-jewel, alloy, and core-shell architectures are summarized. Subsequently, the influence of tailoring metal shells, including monolayer, bilayer, and alloy layer metal shells on core metals, on the catalytic activity of nitroaromatics is discussed. …”
Get full text
Article -
9108
Cultivating Slow Curating in Times of Acceleration
Published 2025-01-01“…Through heritage criticality, we will investigate territory interpretation and intervention examples that adopt disruptive, cross-, inter-, and trans-disciplinary approaches, including artistic, architectural, urban, performative, and curatorial practice, as effects and methods of slow curating taken as a public activity. …”
Get full text
Article -
9109
Exploring Online Synthesis for CGRAs with Specialized Operator Sets
Published 2011-01-01“…We believe that online synthesis that takes place during the execution of an application is one way to broaden the applicability of reconfigurable architectures as no expert knowledge of synthesis and technologies is required. …”
Get full text
Article -
9110
Construction of Internet of things trusted group based on multidimensional attribute trust model
Published 2021-01-01“…The construction of trusted groups provides an architectural foundation for the application of group signature that maintains low network overhead. …”
Get full text
Article -
9111
A Survey on IoT Task Offloading Decisions in Multi-access Edge Computing: A Decision Content Perspective
Published 2023-12-01“…This study investigates the similarities and differences between the enabling technologies, deployment architectures, and decision items of various decision mechanisms from the perspective of offloading decision content. …”
Get full text
Article -
9112
Explainable Security Requirements Classification Through Transformer Models
Published 2025-01-01“…In addition, we employ few-shot learning techniques by leveraging transfer learning models, explicitly utilizing pre-trained architectures. The study demonstrates that these models can effectively classify security requirements with reasonable accuracy, precision, recall, and F1-score, demonstrating that the fine-tuning and SetFit can help smaller models generalize, making them suitable for enhancing security processes in the Software Development Cycle. …”
Get full text
Article -
9113
Engineering 2D spin networks by on-surface encapsulation of azafullerene radicals in nanotemplates
Published 2025-01-01“…Azafullerene encapsulation by nanohoops represents a viable realization of molecular spin protection while simultaneously demonstrating exceptional self-assembling properties by which large-scale 2D architectures of molecular spins can be realized.…”
Get full text
Article -
9114
Innovative Driver Monitoring Systems and On-Board-Vehicle Devices in a Smart-Road Scenario Based on the Internet of Vehicle Paradigm: A Literature and Commercial Solutions Overview
Published 2025-01-01“…The paper describes vehicle condition monitoring architectures, including diagnostic solutions for identifying anomalies, malfunctions, and instability while driving on slippery or wet roads. …”
Get full text
Article -
9115
IMAGES OF THE PAST AND THE PRESENT IN RUSSIAN UNIVERSITY MUSEUMS
Published 2023-12-01“…Their developed interiors use such ancient images as architectural details and images of ancient philosophers, which was common for the 18th-19th century. …”
Get full text
Article -
9116
A Critical Review on the Reconstruction of the Manouchehri House in Kashan
Published 2021-07-01“…Historic houses are the most remnants of Iran's architectural heritage, the multiplicity and diversity of that in historical contexts provide good potential as urban catalysts. …”
Get full text
Article -
9117
A review on challenges and future of green charging networks for zero emission electric transportation
Published 2025-01-01“…Using independent and interlinked mathematical models, authors examine contemporary computational approaches that manage corporate architectural challenges in novel manners. The aim of this work is to investigate potential avenues for future research, with a focus on attaining sustainable mobility while also promoting the intelligent advancement of microgrids. …”
Get full text
Article -
9118
Du surveillant général cerné par les murs au conseiller principal d’éducation, passeur de frontières
Published 2019-03-01“…They reveal a daily life confined by architectural, symbolical and hierarchal walls. The wall metaphorically reflects the educational relationship. …”
Get full text
Article -
9119
The use of metonymy and metaphor in descriptive essays by intermediate and advanced EFL students
Published 2017-12-01“…The participants and their respective controls were given five pictorial stimuli containing famous architectural landmarks in Sweden. The participants and the control group were instructed to write a one paragraph descriptive essay about each pictorial stimulus using either i) an imaginary and creative approach or ii) a non-imaginary and purely descriptive approach. …”
Get full text
Article -
9120
Characterizing Grover search algorithm on large-scale superconducting quantum computers
Published 2025-01-01“…Here, we report results for the implementation and characterization of a three-qubit Grover search algorithm using the state-of-the-art scalable quantum computing technology of superconducting quantum architectures. To delve into the algorithm’s scalability and performance metrics, our investigation spans the execution of the algorithm across all eight conceivable single-result oracles, alongside nine two-result oracles, employing IBM Quantum’s 127-qubit quantum computers. …”
Get full text
Article