Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
921
The Coronation of the Virgin: Alice Meynell’s Typological Critique of Modern Bodies
Published 2011-11-01“…Schaffer insists, though, that, on the contrary, this fictionalized, “angel in the house” ideal of Meynell was only a necessary evil, and must not be allowed to cloud our understanding of the career that it helped enable.Meynell is surely as important as Schaffer says she is, but what if her “piety” is more complex? …”
Get full text
Article -
922
Semantic-Assisted LIDAR Tightly Coupled SLAM for Dynamic Environments
Published 2024-01-01“…Additionally, in point cloud feature extraction and matching processes, we incorporate constraint conditions based on semantic information to enhance accuracy and improve pose estimation precision. …”
Get full text
Article -
923
A Verifiable Discrete Trust Model (VDTM) Using Congruent Federated Learning (CFL) for Social Internet of Vehicles
Published 2024-01-01“…A public, open tool, such as the cloud, is used to share information about things like tolls, traffic, weather, and more. …”
Get full text
Article -
924
Effect of Carbon Supported Pt Catalysts on Selective Hydrogenation of Cinnamaldehyde
Published 2016-01-01“…The enhanced activity can be ascribed to the high graphitization degree of CNTs and high density of dispersed Pt electron cloud.…”
Get full text
Article -
925
Task Offloading Optimization Using PSO in Fog Computing for the Internet of Drones
Published 2024-12-01“…This particularity makes it difficult to apply the conventional task offloading technologies, such as cloud computing and edge computing, in IoD environments. …”
Get full text
Article -
926
A Robust Two-Machine Flow-Shop Scheduling Model with Scenario-Dependent Processing Times
Published 2020-01-01“…Furthermore, we set proposed 12 simple heuristics as the 12 initial seeds to design 12 variants of a cloud theory-based simulated annealing (CSA) algorithm. …”
Get full text
Article -
927
Editorial: ticks & tick-borne parasites and diseases
Published 2024-08-01“…Table 1 summarizes the articles in this Special Issue in alphabetical author order and Fig. 1 is a word cloud generated from the article titles. Of the 17 articles in this Special Issue, two are review articles (vaccinology) while the remaining 15 are original research articles. …”
Get full text
Article -
928
Knowledge Management in Road Accident Detection Based on Developed Deep Learning
Published 2023-12-01“…The study involves creating a smartphone application that continually reads sensor data and sends it to the cloud for further processing. The crash was discovered by threshold analysis. …”
Get full text
Article -
929
Sherlock-Genome: an R Shiny application for genomic analysis and visualization
Published 2025-01-01“…Sherlock-Genome supports both local and cloud deployment, facilitating the sharing of results for related publications. …”
Get full text
Article -
930
The Three-Dimensional Structure of Transatlantic African Dust Transport: A New Perspective from CALIPSO LIDAR Measurements
Published 2012-01-01“…We analyzed over two years of LIDAR measurements from NASA’s CALIPSO and CloudSat satellites to document the vertical pathways of transatlantic transport of Saharan dust. …”
Get full text
Article -
931
A Layered Searchable Encryption Scheme with Functional Components Independent of Encryption Methods
Published 2014-01-01“…Searchable encryption technique enables the users to securely store and search their documents over the remote semitrusted server, which is especially suitable for protecting sensitive data in the cloud. However, various settings (based on symmetric or asymmetric encryption) and functionalities (ranked keyword query, range query, phrase query, etc.) are often realized by different methods with different searchable structures that are generally not compatible with each other, which limits the scope of application and hinders the functional extensions. …”
Get full text
Article -
932
3D Monitoring Model for Real-Time Displacement of Metro Tunnel under “Dual Carbon” Background
Published 2024-01-01“…This article takes the Jinan Metro Tunnel Displacement Real-time Monitoring Project in China as a case study and constructs a comprehensive monitoring framework using robotic total stations, intelligent automated deformation monitoring data collectors, and cloud servers. The implementation details of the project, displacement monitoring principles, monitoring system construction, and data analysis processes are elaborated in detail. …”
Get full text
Article -
933
Assessing urban vegetation inequalities: Methodological insights and evidence
Published 2025-05-01“…ArcGIS was the most widely used GIS platform, closely followed by the cloud-based geospatial analysis platform Google Earth Engine, while R-Studio and Statistical Package for the Social Sciences (SPSS) were popular for statistical analysis. …”
Get full text
Article -
934
Digital maturity of business: Technological gap and limitations of digital transformation
Published 2023-06-01“…As a result of the study, it was found that the main reasons for the unsystematic processes of digitalization of Russian business are the low quality of business digitalization with high digital activity and low technological capabilities for implementing Industry 4.0 technologies due to the limited use of the Internet mobile network in business, business cybersecurity tools, Internet communications and cloud services. The increment of knowledge consists in determining the technological principle of digital business transformation at the global level – this is a mobile device operating on the principles of machine-to-machine interaction M2M with big data IoT (Internet of things) based on 5G speeds and Wi-Fi 6 communication standards, as well as identifying a system of indicators for monitoring the technological basis for managing the “digital maturity” of a business.…”
Get full text
Article -
935
A Bibliometrical Analysis of the Articles on Environmental Education Published between 1973 and 2019
Published 2021-07-01“…The database was scanned using “environment/environmental education” keywords and results regarding the annual distributions of the articles; the journals and the authors with the highest number of related articles; h-index scores of the authors; research collaboration networks; the articles that were cited at the highest rates; the average annual citation scores; the citation burst scores of the authors; the results for word cloud and the conceptual mapping patterns obtained were analyzed. …”
Get full text
Article -
936
Learning a Quantum Computer's Capability
Published 2024-01-01“…We also apply our CNNs to model the capabilities of cloud-access quantum computing systems, obtaining moderate prediction accuracy (average absolute error around 2–5%), and we highlight the challenges to building better neural network capability models.…”
Get full text
Article -
937
Teaching a neural network modeling socio-economic development of the region
Published 2019-11-01“…The use of third-party cloud-based software platforms (primarily IBM and Google infrastructures) allows to bypass the problem of the research team’s lack of expensive material and technical base, however they impose a number of limitations dictated by the requirements of the existing machine learning algorithms and the specific architecture provided platforms This puts the research team in front of the need to prepare the accumulated data set for processing: reducing the dimension, checking the data for compliance with the platform requirements and eliminating potential problem areas: “data leaks”, “learning distortions” and others. …”
Get full text
Article -
938
Enhancing DataOps practices through innovative collaborative models: A systematic review
Published 2025-06-01“…The study highlights the value of frameworks, methodologies, and advanced technologies—such as automation, cloud platforms, and continuous delivery pipelines—that have reshaped the DataOps landscape. …”
Get full text
Article -
939
Impact Evaluation of Assimilating Surface Sensitive Infrared Radiance Observations over Land and Sea Ice from Observing System Simulation Experiments
Published 2015-01-01“…Some limitations of the OSSE approach are identified, linked to the different forecast systems used for the NR and the assimilation and higher cloud contamination in Polar Regions. This analysis provides useful insight in preparation for the assimilation of real radiance observations.…”
Get full text
Article -
940
The Impact of Digitalization on the Efficiency of Investment Activity in the Main Sectors of the Ukrainian Economy
Published 2024-06-01“…The key role of analyzing the current state of digitalization, determining such key indicators as Internet penetration, the level of automation and the use of cloud technologies is noted, and a comparison of these indicators in accordance with international rankings is carried out. …”
Get full text
Article