Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1901
A Fortnite and odd days: the console wars
Published 2022-11-01“…Instead, several breakthroughs such as introducing cloud gaming and subscription video gaming services have contributed to blurring the lines of market delineation altogether. …”
Get full text
Article -
1902
An Automated Voice Control Home System Using Arduino and Bluetooth Module Hc-05.
Published 2024“…Also, it suggests that Google Cloud Messaging be integrated to control our lighting system from the Internet as well as introduce security-sensitive functionality on the voice application.…”
Get full text
Thesis -
1903
Deteksi Covid-19 pada Citra Sinar-X Dada Menggunakan Deep Learning yang Efisien
Published 2020-12-01“…CNN with fewer parameters can save storage and memory usage so that it can process in real time both in the form of detection devices and decision-making systems via the cloud. In addition, CNN with smaller parameters can also be applied to FPGA and other hardware that have limited memory capacity. …”
Get full text
Article -
1904
Understanding the Broad-line Region of Active Galactic Nuclei with Photoionization. I. The Moderate-accretion Regime
Published 2025-01-01“…., mass and Eddington ratio) reveal a substantial intrinsic dispersion around the average R – L relation, suggesting that variations in the broadband spectrum, driven by accretion parameters and other factors such as the cloud distribution and inclination, significantly influence the measured R – L relation. …”
Get full text
Article -
1905
Causes of growing middle-to-upper tropospheric ozone over the northwest Pacific region
Published 2025-01-01Get full text
Article -
1906
Practices and pain points in personal records
Published 2024-03-01“…For example, respondents who saved records on a computer or in the cloud reported higher levels of satisfaction with how they managed their personal records and experienced fewer adverse incidents such as losing documents or failing to pay bills on time. …”
Get full text
Article -
1907
Dynamic Evaluation of Regional Agricultural Drought Vulnerability Based on Triangular Fuzzy Number and Connection Number Coupling
Published 2021-01-01“…Vulnerability assessment of agricultural drought system is of great significance to agricultural drought risk management and risk control practice.In order to quantitatively evaluate the vulnerability of agricultural drought in Bengbu City,an evaluation model of agricultural drought vulnerability is established based on the coupling method of triangular fuzzy number and connection number.Firstly,connection number of single index is calculated by set pair analysis method,and the dynamic difference coefficient of different indexes is determined by the analysis and value method,that is,different-grade standard thresholds correspond to different difference coefficients.Then,connection value of each single index is calculated by combining the opposition coefficient and is weighted to obtain connection value of each subsystem and comprehensive connection value of sample.Finally,vulnerability grade value of regional agricultural drought system is determined by functional relationship between sample comprehensive connection value and evaluation grade value.Moreover,the model based on triangular fuzzy number and connection number coupling is applied to evaluate agricultural drought vulnerability in Bengbu City.The results show that:The results of comprehensive evaluation method based on triangular fuzzy number and connection number coupling were consistent with the comprehensive evaluation method based on grey relational analysis and connection number coupling,cloud similarity evaluation method and fuzzy comprehensive evaluation method.Drought vulnerability in 2001—2003 was strong,close to 3.5,and that in 2004—2010 was moderate,around 3.On the whole,the vulnerability is improved,which show that the ability of Bengbu's agricultural system to resist drought vulnerability is gradually strengthening,and level of agricultural development is constantly improving.Therefore,it can provide a strong basis for the government to scientifically prevent and control drought risks and scientific researchers to conduct quantitative research.…”
Get full text
Article -
1908
Enhanced Vector Quantization for Embedded Machine Learning: A Post-Training Approach With Incremental Clustering
Published 2025-01-01“…While VQ is a technique that reduces model size by grouping similar parameters, incremental clustering, implemented via the AutoCloud K-Fixed algorithm, preserves accuracy during compression. …”
Get full text
Article -
1909
Comparison of Thunderstorm Simulations from WRF-NMM and WRF-ARW Models over East Indian Region
Published 2012-01-01“…From the model-simulated spatial plots of cloud top temperature, we can see that NMM model has better captured the genesis, intensification, and propagation of thunder squall than ARW model. …”
Get full text
Article -
1910
Oral English Auxiliary Teaching System Based on Deep Learning
Published 2022-01-01“…Through the integrated use of information technology, it aimed at building out a deeply mixed teaching mode based on “Cloud Class and Offline Class.” A combination of quantitative and qualitative data collection methods was adopted to evaluate the practical effect. …”
Get full text
Article -
1911
Exploring El Nino effects on agricultural area using Landsat images analysis: A case study in Bondowoso Regency, Indonesia
Published 2024-10-01“…El Nino, which hit Indonesia in 2023, poses severe food security threats due to the high dry season with no rainfall and minimal cloud cover and can trigger serious drought problems if it happen for a long time. …”
Get full text
Article -
1912
Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps
Published 2019-04-01“…With the wide deployment of new computing paradigms, such as cloud computing and edge computing, the people can access services provided by remote servers more conveniently via the Internet. …”
Get full text
Article -
1913
IoT enabled data protection with substitution box for lightweight ciphers
Published 2025-03-01“…The cryptographic techniques used in various traditional devices and cloud environments are not applicable to resource-constrained devices like sensors, industrial controllers, and RFID tags. …”
Get full text
Article -
1914
Public Transport in Rural Roads: Measures to Increase Its Modal Share in Iran
Published 2021-01-01“…In the other two sections of the questionnaire, the respondents were asked to express their opinions regarding the questions in the form of qualitative and words cloud. According to the inquiries made from the users in 20 selected terminals of Iran providing services to more than 85% of rural passengers, the indicators were weighted and divided into two groups based on the rotary analysis. …”
Get full text
Article -
1915
Extending OpenStack Monasca for Predictive Elasticity Control
Published 2024-06-01“…This paper introduces an architecture for predictive cloud operations, which enables orchestrators to apply time-series forecasting techniques to estimate the evolution of relevant metrics and take decisions based on the predicted state of the system. …”
Get full text
Article -
1916
OUTSOURCING OF ACCOUNTING SERVICES IN DIGITAL AGE
Published 2024-12-01“…Nowadays more large companies could outsource their accounting due to e-invoice system and cloud technology. Having in view the clients’ demands, accounting firms can deliver on-site, hybrid or remote services. …”
Get full text
Article -
1917
Optimized Airborne Millimeter-Wave InSAR for Complex Mountain Terrain Mapping
Published 2025-01-01“…Particularly in complex mountainous regions characterized by clouds, terrain, and airspace environments, the window for data collection is extremely limited. …”
Get full text
Article -
1918
Evaluation of Machine Learning Models for Mapping Food Crops using Sentinel-2A Imagery in West Java, Indonesia
Published 2024-01-01“…Google Earth Engine is used in this study as a big data cloud computing platform for remote sensing. Normalized Difference Vegetation Index (NDVI) and Enhanced Vegetation Index (EVI) Sentinel2A imagery is utilized to employ time series data as input characteristics for the three most popular machine learning models: Support Vector Machine (SVM), Random Forest (RF), and Classification and Regression Trees (CART). …”
Get full text
Article -
1919
Design and optimization of distributed energy management system based on edge computing and machine learning
Published 2025-02-01“…In addition, the system response time has been improved by 30% compared to traditional cloud-based solutions. These optimizations not only reduce energy costs, but also effectively enhance the sustainability and intelligence level of distributed energy systems. …”
Get full text
Article -
1920
Accuracy Analysis of the Aerosol Backscatter Coefficient Profiles Derived from the CYY-2B Ceilometer
Published 2018-01-01“…Ceilometers are originally designed for cloud base height monitoring. Since a few years, the number of ceilometers available worldwide is rapidly increasing, and these simple backscatter lidars are investigated to be used for aerosol research. …”
Get full text
Article