Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
6221
-
6222
Conditional similarity triplets enable covariate-informed representations of single-cell data
Published 2025-02-01“…In order to translate immune signatures assayed from blood or tissue into powerful diagnostics, machine learning approaches are often employed to compute immunological summaries or per-sample featurizations, which can be used as inputs to models for outcomes of interest. …”
Get full text
Article -
6223
High-Speed GPU-Based Fully Three-Dimensional Diffuse Optical Tomographic System
Published 2014-01-01“…The forward computation uses finite element method (FEM) and the problem domain is discretized into 14610, 30823, and 66514 tetrahedral elements. …”
Get full text
Article -
6224
Multi-functional broadband diffractive neural network with a single spatial light modulator
Published 2025-01-01“…Diffractive neural networks (DNNs) are emerging as a novel optical computing architecture that combines wave optics with deep-learning methods for high-speed parallel information processing. …”
Get full text
Article -
6225
IoT-Based Solar Energy Measurement and Monitoring Model
Published 2022-01-01“…In this context, with the help of cloud computing-based Internet of things (IOT), the industrial power stations, high-voltage substations, low-voltage networks, power stations that comply with legal regulations on safety from electricity, electrical installations for machinery, alarm systems, fire alarm systems, cathodic corrosion protection mechanisms in oil tanks and pipelines, emergency power supply installations, electrical installations in buildings, and gas alarm systems are inspected and documented.…”
Get full text
Article -
6226
Predicting Welding Distortion in a Panel Structure with Longitudinal Stiffeners Using Inherent Deformations Obtained by Inverse Analysis Method
Published 2014-01-01“…The former only can be used to calculate welding deformation for small or medium scale welded structures due to the limitation of computing speed. On the other hand, the latter is an effective method to estimate the total welding distortion for large and complex welded structures even though it neglects the detailed welding process. …”
Get full text
Article -
6227
Study on Adiabatic Temperature Rise Reflecting Hydration Degree of Concrete
Published 2018-01-01“…Meanwhile, the thermal conductivity and specific heat of concrete are measured via three approaches: by treating the parameters as constant values, by computing the parameters as variables of the degree of hydration, and by back-analyzing the parameters through BP neural network. …”
Get full text
Article -
6228
Decentralized Federated Learning with Prototype Exchange
Published 2025-01-01“…As AI applications become increasingly integrated into daily life, protecting user privacy while enabling collaborative model training has become a crucial challenge, especially in decentralized edge computing environments. Traditional federated learning (FL) approaches, which rely on centralized model aggregation, struggle in such settings due to bandwidth limitations, data heterogeneity, and varying device capabilities among edge nodes. …”
Get full text
Article -
6229
-
6230
A New Sensors-Based Covert Channel on Android
Published 2014-01-01“…Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. …”
Get full text
Article -
6231
Explainable Security Requirements Classification Through Transformer Models
Published 2025-01-01Get full text
Article -
6232
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
Published 2020-01-01“…Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. …”
Get full text
Article -
6233
QR-DeepONet: resolve abnormal convergence issue in deep operator network
Published 2024-01-01Get full text
Article -
6234
Proximate Analysis of Poultry-Mix Formed Feed Using Maize Bran as a Base
Published 2021-01-01Get full text
Article -
6235
A review on control systems hardware and software for robots of various scale and purpose. Part 2. Service robotics
Published 2020-01-01“…The following conclusions are made on the basis of the review results: the key technology in service robotics from the point of view of scalability is the Robot Operating System (ROS); service robotics is today the main springboard for testing intelligent algorithms for the tactical and strategic control levels that are integrated into a common system based on ROS; the problem of ensuring fault tolerance in the service robotics is practically neglected, with the exception of the issue of increasing reliability by changing behavioral algorithms; in a number of areas of service robotics, in which the reduction of mass and dimensions is especially important, the robot control systems are implemented on a single computing device, in other cases a multi-level architecture implemented on Linux-based embedded computers with ROS are used.…”
Get full text
Article -
6236
Optimal Skipping Rates: Training Agents with Fine-Grained Control Using Deep Reinforcement Learning
Published 2019-01-01“…These days game AI is one of the focused and active research areas in artificial intelligence because computer games are the best test-beds for testing theoretical ideas in AI before practically applying them in real life world. …”
Get full text
Article -
6237
Research on two‐level energy management based on tiered demand response and energy storage systems
Published 2024-12-01Get full text
Article -
6238
A Synchronous-Asynchronous Particle Swarm Optimisation Algorithm
Published 2014-01-01Get full text
Article -
6239
Topological Structure of Manufacturing Industry Supply Chain Networks
Published 2018-01-01Get full text
Article -
6240
Towards Human Capture Movement: Estimation of Anatomical Movements of the Shoulder
Published 2013-01-01“…We propose a discrete optimization based-approach which aims to search the optimal attitude ambiguity directly without decorrelation of ambiguity, and to computing the baseline vector consequently. The originality of this paper is to apply the discrete optimization to track the desired trajectory of a nonlinear system such as the Human Movement in the presence of uncertainties. …”
Get full text
Article