Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
6601
Scalable and Privacy-Preserving Inter-AS Routing Through Machine-Learning-Based Graph Pruning
Published 2025-01-01“…These protocols are based on Multi-Party Computation (MPC) schemes, which guarantee privacy at the cost of high computational and communication complexity, thus limiting scalability. …”
Get full text
Article -
6602
-
6603
Integrated Photonic Neural Networks for Equalizing Optical Communication Signals: A Review
Published 2025-01-01“…From this review, it can be concluded that perceptron photonic neural networks perform slightly better in equalizing signals transmitted over greater distances than reservoir computing photonic neural networks, but with signals at lower data rates. …”
Get full text
Article -
6604
Machine Learning-Driven Optimization for Solution Space Reduction in the Quadratic Multiple Knapsack Problem
Published 2025-01-01“…Finally, we conduct comparison experiments, demonstrating that using a ML model is highly beneficial for reducing computing times and achieving rapid convergence.…”
Get full text
Article -
6605
Evaluating 28-Days Performance of Rice Husk Ash Green Concrete under Compression Gleaned from Neural Networks
Published 2023-01-01“…This work will nudge civil engineering and material science researchers toward opting for sustainable computing techniques. However, the study’s limitations include the need for additional research into the material’s long-term behaviour as well as the consideration of other characteristics that may affect its strength, such as environmental conditions like temperature and humidity.…”
Get full text
Article -
6606
Sustainable Mobility in B5G/6G: V2X Technology Trends and Use Cases
Published 2024-01-01“…We start by identifying three current technology trends, namely, towards climate neutral; cloudification and edge computing; and Big Data and artificial intelligence, and then we examine their capability to enable sustainable Vehicle-to-Everything (V2X) communication systems in beyond 5G and 6G networks. …”
Get full text
Article -
6607
Transforming desalination brine into highly reactive magnesium oxide and life cycle analysis
Published 2025-01-01Get full text
Article -
6608
-
6609
A study on the carbon emission reduction pathways of China’s digital economy from multiple perspectives
Published 2025-01-01“…As the share of the digital economy’s output continues to rise each year, the emergence of new industries such as e-commerce, mobile payments, and cloud computing has opened new avenues for carbon emission reduction (CER). …”
Get full text
Article -
6610
Geographical Peer Matching for P2P Energy Sharing
Published 2025-01-01“…Furthermore, we propose and study analytically and empirically a spectrum of approaches to address it and perform a cost-efficient matching of peers in a computationally efficient fashion. Our experimental study, based on real-world energy data, demonstrates that our proposed solutions are efficient both in terms of cost savings achieved by the peers and in terms of communication and computing requirements. …”
Get full text
Article -
6611
Tracking illegal activities using video surveillance systems: a review of the current state of research
Published 2024-03-01“…It has been found that although neural networks used to require a lot of computing power, they can now be used in IoT systems and smartphones, and this contributes to the fact that more video surveillance devices can be used to monitor the situation.…”
Get full text
Article -
6612
DLCDroid an android apps analysis framework to analyse the dynamically loaded code
Published 2025-01-01Get full text
Article -
6613
-
6614
-
6615
Experimental Comparison of HfO<sub>2/X</sub>-Based ReRAM Devices Switching Properties by the MIM Capacitance
Published 2024-01-01“…An increase in the capacitance from 3.904 to 3.917 pF/<inline-formula> <tex-math notation="LaTeX">$\mu $ </tex-math></inline-formula>m2 was observed for the same device when it was subjected to a <inline-formula> <tex-math notation="LaTeX">$144~\mu $ </tex-math></inline-formula>s pulse width, demonstrating a conductance quantization required for the application in in-memory computing systems. Also, the dielectric constant modulates due to the migration of oxygen atoms inside the device’s insulator.…”
Get full text
Article -
6616
Frozen Jacobian Multistep Iterative Method for Solving Nonlinear IVPs and BVPs
Published 2017-01-01“…Frozen Jacobian multistep iterative methods are computationally very efficient. They require only one inversion of the Jacobian in the form of LU-factorization. …”
Get full text
Article -
6617
Application of WiMAX technology in difficult geographical conditions: Perspectives for mountain environment
Published 2025-01-01“…From a server to a pocket computer, almost any personal device that has enough computing power to process text and graphic information is equipped with one or another network interface, from a modem to WiMAX. …”
Get full text
Article -
6618
TS-PAID: A Two-Stage PUF-Based Lightweight Authentication Protocol for Internet of Drones
Published 2025-01-01“…Owing to energy, storage and computational resource-constraints, the complex and heavy cryptographic solutions could not be directly deployed in IoD environment. …”
Get full text
Article -
6619
-
6620