Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
6141
Machine Learning-Based Probabilistic Seismic Demand Model of Continuous Girder Bridges
Published 2022-01-01Get full text
Article -
6142
Applying Dynamic Priority Scheduling Scheme to Static Systems of Pinwheel Task Model in Power-Aware Scheduling
Published 2014-01-01“…This method is more effective than adopting the previous static priority scheduling methods in saving energy consumption and, for the system being still static, it is more tractable and applicable to small sized embedded or ubiquitous computing. Also, we introduce a novel power-aware scheduling algorithm which exploits all slacks under preemptive earliest-deadline first scheduling which is optimal in uniprocessor system. …”
Get full text
Article -
6143
-
6144
Adaptive Sensing Private Property Protection Protocol Based on Cloud
Published 2015-11-01“…In this paper, we propose an adaptive sensing private property authentication scheme which can be applied in the cloud computing. Considering a relatively safe room with a remote reader, there are several valuable items in the room. …”
Get full text
Article -
6145
Lightweight Multi-Scale Network for Segmentation of Riverbank Sand Mining Area in Satellite Images
Published 2025-01-01“…The lightweight multi-scale block combines parallel computing and depthwise convolution to reduce the parameters of the network and enhance its multi-scale extraction ability. …”
Get full text
Article -
6146
Weber’s Law as the emergent phenomenon of choices based on global inhibition
Published 2025-02-01“…It was postulated that the law constituted the emergent phenomenon arising in the choice circuit computing categorical choices based on global inhibition. …”
Get full text
Article -
6147
Customer management in B2B markets in the context of digitalization
Published 2023-09-01“…The analysis of the research, in turn, revealed promising areas in the management of all the company’s clients, such as the gradual introduction of digital marketing methods, the use of technological advances (artificial intelligence and cloud computing), the provision of more personalized experience, the creation of scalable strategies, the development and implementation of domestic digital platforms for managing all the company’s clients.…”
Get full text
Article -
6148
-
6149
-
6150
Lightweight attention-based SAR ship detector
Published 2024-12-01“…In practical applications, computing resources and memory space are limited, and high inference speed is required. …”
Get full text
Article -
6151
Internet marketing organization with the use of intellegent and block chain technologies
Published 2020-05-01“…The objectives of the analysis are to identify trends in the development of Internet marketing in the digital economy with the use of intelligent and blockchain technologies, and to develop new structural solutions.The analysis of the use of intelligent technologies in marketing activities (MA) using cloud computing (CC) is carried out and its features are determined. …”
Get full text
Article -
6152
-
6153
A Framework for the AI-based visualization and analysis of massive amounts of 4D tomography data for end users of beamlines
Published 2025-02-01“…This framework reduces the computational burden on the computing infrastructure of large synchrotron and neutron facilities by allowing end users to process datasets on their institution's computers. …”
Get full text
Article -
6154
DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments
Published 2014-01-01“…Despite the convenience, ubiquitous computing suffers from many threats and security risks. …”
Get full text
Article -
6155
Continuous-Time ΣΔ ADC with Implicit Variable Gain Amplifier for CMOS Image Sensor
Published 2014-01-01Get full text
Article -
6156
Expansion of Impervious Surface Area in Pekanbaru (1990–2018) and Predictions for 2038 Using Big Data
Published 2025-01-01“…The development of spatial big data technology and high-performance cloud computing, the phenomenon of built-up land growth that occurs in Pekanbaru City can be studied further. …”
Get full text
Article -
6157
Detecting Optic Disc on Asians by Multiscale Gaussian Filtering
Published 2012-01-01Get full text
Article -
6158
-
6159
-
6160
FedRSC: A Federated Learning Analysis for Multi-Label Road Surface Classifications
Published 2024-01-01“…This research presents a federated learning analysis that brings together edge computing and cloud technology, by identifying various road conditions through a multi-label road surface classification analysis. …”
Get full text
Article