Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
7681
Enhanced AC/DC optimal power flow via nested distributed optimization for AC/VSC-MTDC hybrid power systems
Published 2025-03-01“…Techniques such as multi-cut generation and asynchronous updating are utilized to upgrade the GBD performance of computation efficiency and address communication delays. …”
Get full text
Article -
7682
Towards Understanding the Security of Modern Image Captchas and Underground Captcha-Solving Services
Published 2019-06-01“…However, the ever-advancing capabilities of computer vision have gradually diminished the security of image captchas and made them vulnerable to attack. …”
Get full text
Article -
7683
MSCPNet: A Multi-Scale Convolutional Pooling Network for Maize Disease Classification
Published 2025-01-01“…These models also suffer from high computational complexity when deeper layers are introduced to handle fine-grained details. …”
Get full text
Article -
7684
Advancing arabic dialect detection with hybrid stacked transformer models
Published 2025-02-01Get full text
Article -
7685
Graph Neural Network-Based Approach for Detecting False Data Injection Attacks on Voltage Stability
Published 2025-01-01Get full text
Article -
7686
-
7687
-
7688
Leveraging two-dimensional pre-trained vision transformers for three-dimensional model generation via masked autoencoders
Published 2025-01-01“…Masking autoencoding is a promising self-supervised learning approach that greatly advances computer vision and natural language processing. For robust 2D representations, pre-training with large image data has become standard practice. …”
Get full text
Article -
7689
Design of High Performance Hybrid Type Digital-Feedback Low Drop-Out Regulator Using SSCG Technique
Published 2021-01-01Get full text
Article -
7690
SGCL-LncLoc: An Interpretable Deep Learning Model for Improving lncRNA Subcellular Localization Prediction with Supervised Graph Contrastive Learning
Published 2024-09-01“…Additionally, we propose a computational method to map the attention weights of the graph nodes to the weights of nucleotides in the lncRNA sequence, allowing SGCL-LncLoc to serve as an interpretable deep learning model. …”
Get full text
Article -
7691
Enhancing Drought Forecast Accuracy Through Informer Model Optimization
Published 2025-01-01Get full text
Article -
7692
Gradient diffusion entropy corrected ALNS optimization for vegetation topology interaction networks
Published 2025-01-01Get full text
Article -
7693
-
7694
Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks
Published 2025-01-01“…The lightweight D-H key exchange ensures that even resource-constrained IoT devices can securely perform key exchanges without significant computational overhead. Experimental results demonstrate the practicality and security of the proposed mechanism, achieving key updates with minimal time overhead, ranging from 12 to 50 milliseconds per encryption transmission. …”
Get full text
Article -
7695
Type and cotype of some Banach spaces
Published 1992-01-01“…Type and cotype are computed for Banach spaces generated by some positive sublinear operators and Banach function spaces. …”
Get full text
Article -
7696
Extracting Skeleton of the Global Terrorism Network Based on m-Modified Topology Potential
Published 2020-01-01Get full text
Article -
7697
Zero-day exploits detection with adaptive WavePCA-Autoencoder (AWPA) adaptive hybrid exploit detection network (AHEDNet)
Published 2025-02-01“…Abstract This paper introduces a new probabilistic composite model for the detection of zero-day exploits targeting the capabilities of existing anomaly detection systems in terms of accuracy, computational time, and adaptability. To address the issues mentioned above, the proposed framework consisted of three novel elements. …”
Get full text
Article -
7698
Knowledge Graph-Enhanced Digital Twin Framework for Optimized Job Shop Scheduling in Smart Manufacturing
Published 2025-01-01“…The second algorithm uses the results of the first algorithm to calculate the running time and energy consumption for each machine in each production line, considering that the production lines of the factory vary in capacity and power, then computes the total energy consumption and presents the results to the decision maker via a dashboard. …”
Get full text
Article -
7699
Pic2Plate: A Vision-Language and Retrieval-Augmented Framework for Personalized Recipe Recommendations
Published 2025-01-01Get full text
Article -
7700
A Lightweight Human Activity Recognition Method for Ultra-wideband Radar Based on Spatiotemporal Features of Point Clouds
Published 2025-02-01“…The results show that the proposed method achieves a human activity recognition rate of 96.75% while consuming fewer parameters and computational resources, thereby verifying its effectiveness.…”
Get full text
Article