Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
9881
Improving Sleep Disorder Diagnosis Through Optimized Machine Learning Approaches
Published 2025-01-01“…Thus, this research proposes Gradient Boosting as the most effective method, outperforming all state-of-the-art techniques by achieving the highest accuracy, precision, recall, F1-score, and AUC, highlighting its superior classification performance and computational efficiency.…”
Get full text
Article -
9882
-
9883
-
9884
Noise-agnostic quantum error mitigation with data augmented neural models
Published 2025-01-01Get full text
Article -
9885
-
9886
-
9887
Behaviour of passage time for a queueing network model with feedback: a simulation study
Published 2004-01-01“…The model can be applied to a twin-processor multiprogramming computer system.…”
Get full text
Article -
9888
Symbolic Solution to Complete Ordinary Differential Equations with Constant Coefficients
Published 2013-01-01“…The aim of this paper is to introduce a symbolic technique for the computation of the solution to a complete ordinary differential equation with constant coefficients. …”
Get full text
Article -
9889
Water Hammer Modelling and Simulation by GIS
Published 2012-01-01“…This work defined an Eulerian-based computational model compared with regression of the relationship between the dependent and independent variables for water hammer surge wave in transmission pipeline. …”
Get full text
Article -
9890
A Survey of Artificial Immune System Based Intrusion Detection
Published 2014-01-01“…In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. …”
Get full text
Article -
9891
Modeling shrimp biomass and viral infection for production of biological countermeasures
Published 2006-07-01Get full text
Article -
9892
Three-dimensional photoluminescence imaging of threading dislocations in GaN by sub-band optical excitation
Published 2025-01-01Get full text
Article -
9893
Optimized Liveness Detection for Fast and Accurate Fingerprint Anti-Spoofing With Optical Coherence Tomography
Published 2024-01-01“…However, previous methods suffer from long data acquisition and computation times as well as low recognition accuracy. …”
Get full text
Article -
9894
Enhancing cardiac diagnostics: a deep learning ensemble approach for precise ECG image classification
Published 2025-01-01Get full text
Article -
9895
Intelligent two-phase dual authentication framework for Internet of Medical Things
Published 2025-01-01“…The results show that encryption/decryption time is reduced by over 45%, overall computational cost by 45.38%, and latency by 28.42% over existing approaches. …”
Get full text
Article -
9896
Multi-agent resource allocation strategy for UAV swarm-based cooperative sensing
Published 2023-03-01“…Driven by the development of intelligent internet of things (IoT) technology, unmanned aerial vehicle (UAV) swarms have been widely used for sensing and monitoring in emergency and rescue scenarios.The UAVs automatically sense and discover mission targets in the mission area, recruiting neighboring UAVs to form perception and computation task groups to collaboratively complete the perception, acquisition and processing of data.However, repetitive sensory data and imbalance in the supply and demand of computational resources between multiple tasks cause additional computational and communication overheads and increase the end-to-end processing latency.To address this challenge, a multi-task resource allocation approach combining bionics and multi-agent independent reinforcement learning was proposed, making collaborative resource allocation decisions based on local task information.The method represents the resource requirements of individual tasks as situational information concentrations and dynamically updates the heterogeneous resource requirements of each task by spreading the situational information across task groups.At the same time, it combines multi-agent independent reinforcement learning methods for intelligent decision making in order to collaboratively allocate the heterogeneous resources of each task.Simulation results show that this solution can not only effectively reduce the task execution time, but also significantly improve the computational resource utilization.…”
Get full text
Article -
9897
Calculation of coal cleats spacing for methane degassing by image processing
Published 2025-01-01“…Computer-based image processing technology was conducted to determine the coal cleats. …”
Get full text
Article -
9898
Analysis of a Reflectarray by Using an Iterative Domain Decomposition Technique
Published 2012-01-01“…The approach is based on a domain decomposition technique that divides the geometry into several parts to minimize the vast computational resources required when applying a full wave method. …”
Get full text
Article -
9899
-
9900
Global stability analysis for SEIS models with n latent classes
Published 2007-12-01“…We compute the basic reproduction ratio of a SEIS model withn classes of latent individuals and bilinear incidence.The system exhibits thetraditional behaviour. …”
Get full text
Article