Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
901
Deteksi Covid-19 pada Citra Sinar-X Dada Menggunakan Deep Learning yang Efisien
Published 2020-12-01“…CNN with fewer parameters can save storage and memory usage so that it can process in real time both in the form of detection devices and decision-making systems via the cloud. In addition, CNN with smaller parameters can also be applied to FPGA and other hardware that have limited memory capacity. …”
Get full text
Article -
902
Understanding the Broad-line Region of Active Galactic Nuclei with Photoionization. I. The Moderate-accretion Regime
Published 2025-01-01“…., mass and Eddington ratio) reveal a substantial intrinsic dispersion around the average R – L relation, suggesting that variations in the broadband spectrum, driven by accretion parameters and other factors such as the cloud distribution and inclination, significantly influence the measured R – L relation. …”
Get full text
Article -
903
Causes of growing middle-to-upper tropospheric ozone over the northwest Pacific region
Published 2025-01-01Get full text
Article -
904
Practices and pain points in personal records
Published 2024-03-01“…For example, respondents who saved records on a computer or in the cloud reported higher levels of satisfaction with how they managed their personal records and experienced fewer adverse incidents such as losing documents or failing to pay bills on time. …”
Get full text
Article -
905
Enhanced Vector Quantization for Embedded Machine Learning: A Post-Training Approach With Incremental Clustering
Published 2025-01-01“…While VQ is a technique that reduces model size by grouping similar parameters, incremental clustering, implemented via the AutoCloud K-Fixed algorithm, preserves accuracy during compression. …”
Get full text
Article -
906
Comparison of Thunderstorm Simulations from WRF-NMM and WRF-ARW Models over East Indian Region
Published 2012-01-01“…From the model-simulated spatial plots of cloud top temperature, we can see that NMM model has better captured the genesis, intensification, and propagation of thunder squall than ARW model. …”
Get full text
Article -
907
Oral English Auxiliary Teaching System Based on Deep Learning
Published 2022-01-01“…Through the integrated use of information technology, it aimed at building out a deeply mixed teaching mode based on “Cloud Class and Offline Class.” A combination of quantitative and qualitative data collection methods was adopted to evaluate the practical effect. …”
Get full text
Article -
908
Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
Published 2019-04-01“…With the wide deployment of new computing paradigms, such as cloud computing and edge computing, the people can access services provided by remote servers more conveniently via the Internet. …”
Get full text
Article -
909
IoT enabled data protection with substitution box for lightweight ciphers
Published 2025-03-01“…The cryptographic techniques used in various traditional devices and cloud environments are not applicable to resource-constrained devices like sensors, industrial controllers, and RFID tags. …”
Get full text
Article -
910
Public Transport in Rural Roads: Measures to Increase Its Modal Share in Iran
Published 2021-01-01“…In the other two sections of the questionnaire, the respondents were asked to express their opinions regarding the questions in the form of qualitative and words cloud. According to the inquiries made from the users in 20 selected terminals of Iran providing services to more than 85% of rural passengers, the indicators were weighted and divided into two groups based on the rotary analysis. …”
Get full text
Article -
911
Extending OpenStack Monasca for Predictive Elasticity Control
Published 2024-06-01“…This paper introduces an architecture for predictive cloud operations, which enables orchestrators to apply time-series forecasting techniques to estimate the evolution of relevant metrics and take decisions based on the predicted state of the system. …”
Get full text
Article -
912
Optimized Airborne Millimeter-Wave InSAR for Complex Mountain Terrain Mapping
Published 2025-01-01“…Particularly in complex mountainous regions characterized by clouds, terrain, and airspace environments, the window for data collection is extremely limited. …”
Get full text
Article -
913
Design and optimization of distributed energy management system based on edge computing and machine learning
Published 2025-02-01“…In addition, the system response time has been improved by 30% compared to traditional cloud-based solutions. These optimizations not only reduce energy costs, but also effectively enhance the sustainability and intelligence level of distributed energy systems. …”
Get full text
Article -
914
Accuracy Analysis of the Aerosol Backscatter Coefficient Profiles Derived from the CYY-2B Ceilometer
Published 2018-01-01“…Ceilometers are originally designed for cloud base height monitoring. Since a few years, the number of ceilometers available worldwide is rapidly increasing, and these simple backscatter lidars are investigated to be used for aerosol research. …”
Get full text
Article -
915
Review of communication optimization methods in federated learning
Published 2024-12-01“…With the development and popularization of artificial intelligence technologies represented by deep learning, the security issues they continuously expose have become a huge challenge affecting cyberspace security. Traditional cloud-centric distributed machine learning, which trains models or optimizes model performance by collecting data from participating parties, is susceptible to security attacks and privacy attacks during the data exchange process, leading to consequences such as a decline in overall system efficiency or the leakage of private data. …”
Get full text
Article -
916
Monitoring of Ionospheric Anomalies Using GNSS Observations to Detect Earthquake Precursors
Published 2025-01-01“…The robustness of the results is strongly related to the availability of a dense Ionosphere Pierce Point (IPP) cloud on the ionospheric layer and surrounding the studied area. …”
Get full text
Article -
917
Environmental influence and species occurrence of yellowjacket drones in an invaded area
Published 2025-01-01“…Also, weather and time of day influence the number of individuals simultaneously gathering, as higher abundances of flying drones are found in early hours, warmer days and at low cloud cover. Lastly, through mid-flight drone captures, we determined that both V. germanica and V. vulgaris drones are found concurrently in the same rendezvous areas. …”
Get full text
Article -
918
Qualified Digital Ecosystems As an Academic Information System Framework in The Industrial 4.0
Published 2024-12-01“…This study addresses these gaps by implementing a comprehensive quality framework for AIS, integrating cloud computing for enhanced security and privacy, and employing the Web-Based Application Quality Model (WBAQM) as the primary development framework. …”
Get full text
Article -
919
A multi-task genetic programming approach for online multi-objective container placement in heterogeneous cluster
Published 2024-11-01“…Online container placement aims to improve resource utilization and meet other service quality requirements of cloud data centers. Most current heuristic and hyper-heuristic methods for container placement rely on single allocation rules, which are inefficient in heterogeneous cluster scenarios. …”
Get full text
Article -
920
Query-Biased Preview over Outsourced and Encrypted Data
Published 2013-01-01“…For both convenience and security, more and more users encrypt their sensitive data before outsourcing it to a third party such as cloud storage service. However, searching for the desired documents becomes problematic since it is costly to download and decrypt each possibly needed document to check if it contains the desired content. …”
Get full text
Article