Suggested Topics within your search.
Suggested Topics within your search.
- Cloud computing 2
- Information technology 2
- Internet in public administration 2
- Public administration 2
- COMPUTERS / Internet / General 1
- Computer graphics 1
- Computer networks 1
- Computer scheduling 1
- Computer systems 1
- Digital techniques 1
- Distributed processing 1
- Electronic data processing 1
- Image processing 1
- MATHEMATICS / General 1
- MATHEMATICS / Number Systems 1
- Management 1
- Parallel programs (Computer programs) 1
- Photography 1
- Technique 1
- Watercolor painting 1
-
1961
LiDAR and IMU Tightly Coupled Localization System Based on Ground Constraint in Flat Scenario
Published 2024-01-01“…At the front end, the ground segmentation algorithm Patchwork is improved to obtain a point cloud with higher verticality, which is added to the LiDAR inertial odometry. …”
Get full text
Article -
1962
E-Commerce Fraud Detection Based on Machine Learning Techniques: Systematic Literature Review
Published 2024-06-01“…Advances in artificial intelligence, Machine Learning (ML), and cloud computing have revitalized research and applications in this domain. …”
Get full text
Article -
1963
A semi-synchronous federated learning framework with chaos-based encryption for enhanced security in medical image sharing
Published 2025-03-01“…The approach integrates federated learning with chaos-based encryption, utilizing the Henon Logistic Crossed Couple Map (HLCML) to strengthen the security of hospital images stored on cloud servers. With its foundation in chaos-based approaches, the encryption algorithm is non-interactive, uses weighted parameters in each aggregation phase, and offers strong privacy protection using semi-synchronous and differential privacy techniques. …”
Get full text
Article -
1964
The macroeconomics of abortion: A scoping review and analysis of the costs and outcomes.
Published 2021-01-01“…<h4>Conclusions</h4>Given the highly charged political nature of abortion around the global and the preponderance of rhetoric that can cloud reality in policy dialogues, it is imperative that social science researchers build the evidence base on the macroeconomic outcomes of abortion services and regulations.…”
Get full text
Article -
1965
A hierarchical overlay network optimisation model for enhancing data transmission performance in blockchain systems
Published 2024-12-01“…In the initial stage, network nodes are treated as points in a point cloud, and farthest point sampling is applied to the P2P network nodes. …”
Get full text
Article -
1966
-
1967
UAV Data Collection Co-Registration: LiDAR and Photogrammetric Surveys for Coastal Monitoring
Published 2025-01-01“…This work addresses the use of the ICP method for registering point clouds representative of coastal environments, with some limitations related to the required presence of stable areas between the clouds and the potential errors associated with featureless surfaces.…”
Get full text
Article -
1968
Interference of longitudinal and transversal fragmentations in the Josephson tunneling dynamics of Bose–Einstein condensates
Published 2025-01-01“…To this end, we exploit the transverse degree-of-freedom of the junction to encode initial fragmentation to the bosonic cloud. We find rich many-body dynamics, which includes the speed up of the collapse of density oscillations and slow down of the revival process, by analyzing the survival probability along the junction, fluctuations of particle positions across the junction, and the occupancy of the lowest single-particle states. …”
Get full text
Article -
1969
Probabilistic forecasting of multiple plant day-ahead renewable power generation sequences with data privacy preserving
Published 2025-01-01“…In DIFL, each client, which serves each local renewable power plant, maps its raw data input into latent features via a local feature extractor and generates power output sequence probabilistic forecasts via a locally hosted forecasting model. The cloud-hosted server first aggregates the knowledge from models of clients and next dispatches the aggregated model back to each client for facilitating each local feature extractor to identify domain-invariant features via interacting with a server-side discriminator. …”
Get full text
Article -
1970
-
1971
Hypergraph-based resource allocation for Device-to-Device underlay H-CRAN network
Published 2020-08-01“…In the hybrid communication scenario of the Heterogeneous Cloud Radio Access Network and Device-to-Device in 5G, spectrum efficiency promotion and the interference controlling caused by spectrum reuse are still challenges. …”
Get full text
Article -
1972
XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System
Published 2025-01-01“…The rapid evolution of technologies such as the Internet of Things (IoT), 5G, and cloud computing has exponentially increased the complexity of cyber attacks. …”
Get full text
Article -
1973
Evaluating waist-to-hip ratio in youth using frequency-modulated continuous wave radar and machine learning
Published 2025-01-01“…We included 100 participants aged 7–18 and radar data were analyzed using point cloud generation processed through convolutional neural networks for estimating WHR. …”
Get full text
Article -
1974
Molecular Dynamics-Based Two-Dimensional Simulation of Powder Bed Additive Manufacturing Process for Unimodal and Bimodal Systems
Published 2025-01-01“…A two-dimensional powder bed was developed in this work using the LAMMPS (Large-scale Atomic/Molecular Massively Parallel Simulator) package to better understand the effect of bimodal and unimodal particle size distribution on powder bed packing. A cloud-based pouring of powders with varying volume fractions and different initialization velocities was adopted, where a blade-type recoater was used to spread the powders. …”
Get full text
Article -
1975
Verification of the Efficacy of Passive Autocatalytic Recombiners in a Typical Pressurized Water Reactor under a Station Blackout Condition
Published 2022-01-01“…The presence of a stable stratified gas cloud inside the containment near or at the flammability limit may lead to deflagration or even detonation which may challenge the containment and cause a radioactive material release into the environment. …”
Get full text
Article -
1976
An efficient medical data encryption scheme using selective shuffling and inter-intra pixel diffusion IoT-enabled secure E-healthcare framework
Published 2025-02-01“…The encrypted data is transmitted via the Thing Speak cloud and received by another Raspberry Pi at the receiver to decrypt the cipher data. …”
Get full text
Article -
1977
A Decentralized Storage and Security Engine (DeSSE) Using Information Fusion Based on Stochastic Processes and Quantum Mechanics
Published 2025-01-01“…The data analytics show a very effective and robust solution, with executions time comparable with cloud technologies, but with a level of security that is a post quantum one. …”
Get full text
Article -
1978
Enhancing computational accuracy with parallel parameter optimization in variational quantum eigensolver
Published 2025-01-01“…However, this approach is unsuitable for cloud-based quantum processing unit utilization due to the increased number of quantum circuit executions. …”
Get full text
Article -
1979
FI-NL2PY2SQL: Financial Industry NL2SQL Innovation Model Based on Python and Large Language Model
Published 2025-01-01“…This paper innovatively proposes a new NL2SQL method based on a large language model (LLM), which could be adapted to an edge-cloud computing platform. First, natural language is converted into Python language, and then SQL is generated through Python. …”
Get full text
Article -
1980
Digital Transformation of Education and Challenges of the 21st Century
Published 2022-06-01“…The authors describe the information infrastructure of BSU, which ensures the implementation of innovative pedagogical technologies: telecommunications infrastructure and a “cloud” data center, an educational process management system integrated with corporate systems and services, its own video conferencing system, an integrated automated information system developed by the university.…”
Get full text
Article