Showing 8,761 - 8,780 results of 21,428 for search '"computing"', query time: 0.08s Refine Results
  1. 8761

    Graphon Neural Networks-Based Detection of False Data Injection Attacks in Dynamic Spatio-Temporal Power Systems by Rachad Atat, Abdulrahman Takiddin, Muhammad Ismail, Erchin Serpedin

    Published 2025-01-01
    “…This allows to leverage the learning by transference on the graphs to address the computational complexity and environmental concerns of training on large-scale systems, and the dynamicity resulting from the spatio-temporal evolution of power systems. …”
    Get full text
    Article
  2. 8762
  3. 8763
  4. 8764
  5. 8765
  6. 8766
  7. 8767
  8. 8768
  9. 8769
  10. 8770

    Hybrid Modified K-Means with C4.5 for Intrusion Detection Systems in Multiagent Systems by Wathiq Laftah Al-Yaseen, Zulaiha Ali Othman, Mohd Zakree Ahmad Nazri

    Published 2015-01-01
    “…Presently, the processing time and performance of intrusion detection systems are of great importance due to the increased speed of traffic data networks and a growing number of attacks on networks and computers. Several approaches have been proposed to address this issue, including hybridizing with several algorithms. …”
    Get full text
    Article
  11. 8771
  12. 8772

    Heavy and Lightweight Deep Learning Models for Semantic Segmentation: A Survey by Cristina Carunta, Alina Carunta, Calin-Adrian Popa

    Published 2025-01-01
    “…Semantic segmentation is an important computer vision task due to its numerous real-world applications such as autonomous driving, video surveillance, medical image analysis, robotics, augmented reality, among others, and its popularity increased with the development of deep learning approaches. …”
    Get full text
    Article
  13. 8773
  14. 8774
  15. 8775
  16. 8776
  17. 8777

    Automatic Segmentation of Ischemic Stroke Lesions in CT Perfusion Maps Using Deep Learning Networks by Lida Zare Lahijan, Saeed Meshgini, Reza Afrouzian

    Published 2024-09-01
    “…The current standard approach for segmenting ischemic stroke lesions is based on thresholding of computed tomography perfusion (CTP) maps. However, this detection approach is inaccurate (the dice similarity coefficient is around 68%). …”
    Get full text
    Article
  18. 8778
  19. 8779

    Massive Scrotal Hematoma due to Ruptured Anastomotic Pseudoaneurysm in a Patient with Aortobifemoral Bypass Surgery: CTA Evaluation by Magdalini Smarda, Dimitrios Fagkrezos, Ilias Dodos, Anastasios Potouridis, Dimitrios Staramos, Charikleia Triantopoulou, Petros Maniatis

    Published 2019-01-01
    “…Ultrasound evaluation revealed a massive scrotal hematoma. Computed tomography angiography (CTA) was conducted, confirming the aortobifemoral graft existence and revealing bilateral anastomotic pseudoaneurysms with the left one being ruptured, resulting in extension of the hematoma to the left femoro-inguinal region and the scrotum. …”
    Get full text
    Article
  20. 8780

    Hybrid Movie Recommendation System With User Partitioning and Log Likelihood Content Comparison by Yongmao Yang, Kampol Woradit, Kenneth Cosh

    Published 2025-01-01
    “…The Alternating Least Squares (ALS) method, in particular, stands out for its ability to process data in parallel, thereby enhancing computational efficiency. However, when dealing with an original rating matrix, the ALS method may inadvertently sacrifice some information, leading to increased error rates. …”
    Get full text
    Article