Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
11341
A Multi-Branch Convolution and Dynamic Weighting Method for Bearing Fault Diagnosis Based on Acoustic–Vibration Information Fusion
Published 2025-01-01“…Additionally, when processing acoustic signals, a depthwise separable convolutional network is used, effectively reducing computational complexity. Experimental results demonstrate that our method significantly outperforms other algorithms in terms of convergence speed and final performance. …”
Get full text
Article -
11342
Evaluation of the Cost of Intelligent Upgrades of Transportation Infrastructure for Intelligent Connected Vehicles
Published 2022-01-01“…The costs of RSUs, LIDARS, and edge computing servers as well as data transmission rate of 5G are key elements affecting the costs of intelligent upgrades of transportation infrastructure.…”
Get full text
Article -
11343
Assessing left main bifurcation anatomy and haemodynamics as a potential surrogate for disease risk in suspected coronary artery disease without stenosis
Published 2025-01-01“…This is especially powerful with the latest computing resources and may unlock clinical integration via standard imaging modalities as biomarkers without further computationally expensive simulations.…”
Get full text
Article -
11344
SS-YOLO: A Lightweight Deep Learning Model Focused on Side-Scan Sonar Target Detection
Published 2025-01-01“…The lightweight design is essential for reducing computational complexity and resource consumption, allowing the model to be more efficient on edge devices with limited processing power and storage. …”
Get full text
Article -
11345
Production of Biogas and Bio-fertilizer from Abattoir Waste as Sustainable Management, Eastern Ethiopia, 2019
Published 2020-01-01“…The magnitude of abattoir waste composition were computed based on Aneibo mathematical computational from the actual number of slaughtered livestock. …”
Get full text
Article -
11346
Preface
Published 2015-12-01“…A variety of problems in computational neuroscienceaccompanied with a rich diversity of mathematical tools and approachesare presented. …”
Get full text
Article -
11347
Accelerated Modeling of Transients in Electromagnetic Devices Based on Magnetoelectric Substitution Circuits
Published 2025-01-01“…The resulting dangerous current surges are best studied by computer simulation. However, the time required for computer simulation of such processes is significant for complex electromagnetic devices, which is undesirable. …”
Get full text
Article -
11348
Signals of propaganda-Detecting and estimating political influences in information spread in social networks.
Published 2025-01-01“…While computational propaganda influences modern society, it is hard to measure or detect it. …”
Get full text
Article -
11349
Hybrid optimization of EDLP and high-low pricing strategies
Published 2025-01-01“…This linearization simplifies the computational process, enabling the model to scale and be applied in large retail settings. …”
Get full text
Article -
11350
Adversarial examples defense method based on multi-dimensional feature maps knowledge distillation
Published 2022-04-01“…The neural network approach has been commonly used in computer vision tasks.However, adversarial examples are able to make a neural network generate a false prediction.Adversarial training has been shown to be an effective approach to defend against the impact of adversarial examples.Nevertheless, it requires high computing power and long training time thus limiting its application scenarios.An adversarial examples defense method based on knowledge distillation was proposed, reusing the defense experience from the large datasets to new classification tasks.During distillation, teacher model has the same structure as student model and the feature map vector was used to transfer experience, and clean samples were used for training.Multi-dimensional feature maps were utilized to enhance the semantic information.Furthermore, an attention mechanism based on feature map was proposed, which boosted the effect of distillation by assigning weights to features according to their importance.Experiments were conducted over cifar100 and cifar10 open-source dataset.And various white-box attack algorithms such as FGSM (fast gradient sign method), PGD (project gradient descent) and C&W (Carlini-Wagner attack) were applied to test the experimental results.The accuracy of the proposed method on Cifar10 clean samples exceeds that of adversarial training and is close to the accuracy of the model trained on clean samples.Under the PGD attack of L2 distance, the efficiency of the proposed method is close to that of adversarial training, which is significantly higher than that of normal training.Moreover, the proposed method is a light-weight adversarial defense method with low learning cost.The computing power requirement is far less than that of adversarial training even if optimization schemes such as attention mechanism and multi-dimensional feature map are added.Knowledge distillation can learn the decision-making experience of normal samples and extract robust features as a neural network learning scheme.It uses a small amount of data to generate accurate and robust models, improves generalization, and reduces the cost of adversarial training.…”
Get full text
Article -
11351
Machine learning-based prediction of hemodynamic parameters in left coronary artery bifurcation: A CFD approach
Published 2025-01-01“…Hemodynamic parameters (TAWSS and OSI) were computed using CFD simulations and utilized for ML model training. …”
Get full text
Article -
11352
A Massively Parallel SMC Sampler for Decision Trees
Published 2025-01-01“…A widely used approach to reducing an algorithm’s runtime is to employ modern multi-core computer architectures, either with shared memory (SM) or distributed memory (DM), and use parallel computing to accelerate the algorithm. …”
Get full text
Article -
11353
Production of Biogas and Bio-fertilizer from Abattoir Waste as Sustainable Management, Eastern Ethiopia, 2019
Published 2020-01-01“…The magnitude of abattoir waste composition were computed based on Aneibo mathematical computational from the actual number of slaughtered livestock. …”
Get full text
Article -
11354
Semantic Segmentation Method for High-Resolution Tomato Seedling Point Clouds Based on Sparse Convolution
Published 2024-12-01Get full text
Article -
11355
A Two-Point Association Tracking System Incorporated With YOLOv11 for Real-Time Visual Tracking of Laparoscopic Surgical Instruments
Published 2025-01-01“…Real-time tracking of surgical instruments allows for more accurate maneuvering, reduces the risk of accidental tissue damage, and enables the development of advanced computer-assisted surgical systems. In this context, advancements in deep learning, particularly through detection models and modern tracking algorithms, have opened new avenues for addressing the challenges posed by real-time laparoscopic instrument tracking. …”
Get full text
Article -
11356
-
11357
-
11358
A Novel Air-to-Ground Communication Scheme for Advanced Big Data Collection in Smart Farming Using UAVs
Published 2025-01-01Get full text
Article -
11359
-
11360