Showing 10,641 - 10,660 results of 28,739 for search '"computing"', query time: 0.12s Refine Results
  1. 10641

    SVM directed machine learning classifier for human action recognition network by Dharmanna Lamani, Pramod Kumar, A Bhagyalakshmi, J. Maria Shanthi, Lakshmana Phaneendra Maguluri, Mohammad Arif, C Dhanamjayulu, Sathish Kumar. K, Baseem Khan

    Published 2025-01-01
    “…However, existing approaches such as three-dimensional convolutional neural networks (3D CNN) and two-stream neural networks (2SNN) have computational hurdles due to the significant parameterization they require. …”
    Get full text
    Article
  2. 10642

    An empirical study of LLaMA3 quantization: from LLMs to MLLMs by Wei Huang, Xingyu Zheng, Xudong Ma, Haotong Qin, Chengtao Lv, Hong Chen, Jie Luo, Xiaojuan Qi, Xianglong Liu, Michele Magno

    Published 2024-12-01
    “…Abstract The LLaMA family, a collection of foundation language models ranging from 7B to 65B parameters, has become one of the most powerful open-source large language models (LLMs) and the popular LLM backbone of multi-modal large language models (MLLMs), widely used in computer vision and natural language understanding tasks. …”
    Get full text
    Article
  3. 10643
  4. 10644
  5. 10645
  6. 10646

    Leveraging two-dimensional pre-trained vision transformers for three-dimensional model generation via masked autoencoders by Muhammad Sajid, Kaleem Razzaq Malik, Ateeq Ur Rehman, Tauqeer Safdar Malik, Masoud Alajmi, Ali Haider Khan, Amir Haider, Seada Hussen

    Published 2025-01-01
    “…Masking autoencoding is a promising self-supervised learning approach that greatly advances computer vision and natural language processing. For robust 2D representations, pre-training with large image data has become standard practice. …”
    Get full text
    Article
  7. 10647
  8. 10648

    SGCL-LncLoc: An Interpretable Deep Learning Model for Improving lncRNA Subcellular Localization Prediction with Supervised Graph Contrastive Learning by Min Li, Baoying Zhao, Yiming Li, Pingjian Ding, Rui Yin, Shichao Kan, Min Zeng

    Published 2024-09-01
    “…Additionally, we propose a computational method to map the attention weights of the graph nodes to the weights of nucleotides in the lncRNA sequence, allowing SGCL-LncLoc to serve as an interpretable deep learning model. …”
    Get full text
    Article
  9. 10649
  10. 10650
  11. 10651
  12. 10652
  13. 10653

    Snake-DETR: a lightweight and efficient model for fine-grained snake detection in complex natural environments by Heng Wang, Shuai Zhang, Cong Zhang, Zheng Liu, Qiuxian Huang, Xinyi Ma, Yiming Jiang

    Published 2025-01-01
    “…Compared to other state-of-the-art models, Snake-DETR achieved an accuracy of 97.66%, a recall rate of 93.92%, mAP@0.5 of 95.23%, and mAP@0.5:0.95 of 72.15%, all outperforming other algorithms in the comparative tests. Furthermore, the computational load and parameter count of the model are reduced by 47.2 and 52.2%, respectively, compared to the benchmark model. …”
    Get full text
    Article
  14. 10654

    Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks by Chung-Wei Kuo, Wei Wei, Chun-Chang Lin, Yu-Yi Hong, Jia-Ruei Liu, Kuo-Yu Tsai

    Published 2025-01-01
    “…The lightweight D-H key exchange ensures that even resource-constrained IoT devices can securely perform key exchanges without significant computational overhead. Experimental results demonstrate the practicality and security of the proposed mechanism, achieving key updates with minimal time overhead, ranging from 12 to 50 milliseconds per encryption transmission. …”
    Get full text
    Article
  15. 10655

    THE DETERMINATION OF THE SHARPNESS DEPTH BORDERS AND CORRESPONDING PHOTOGRAPHY AND VIDEO RECORDING PARAMETERS FOR CONTEMPORARY VIDEO TECHNOLOGY by E. G. Zaytseva, A. A. Kisljuk

    Published 2015-04-01
    “…The method of determination of the sharpness depth borders was improved for contemporary video technology. The computer programme for determination of corresponding video recording parameters was created.…”
    Get full text
    Article
  16. 10656

    The Boolean zeta function by Algirdas Javtokas

    Published 2005-12-01
    “…., xm) function known in theoretical computer science. …”
    Get full text
    Article
  17. 10657
  18. 10658

    Zero-day exploits detection with adaptive WavePCA-Autoencoder (AWPA) adaptive hybrid exploit detection network (AHEDNet) by Ahmed A. Mohamed, Abdullah Al-Saleh, Sunil Kumar Sharma, Ghanshyam G. Tejani

    Published 2025-02-01
    “…Abstract This paper introduces a new probabilistic composite model for the detection of zero-day exploits targeting the capabilities of existing anomaly detection systems in terms of accuracy, computational time, and adaptability. To address the issues mentioned above, the proposed framework consisted of three novel elements. …”
    Get full text
    Article
  19. 10659

    Knowledge Graph-Enhanced Digital Twin Framework for Optimized Job Shop Scheduling in Smart Manufacturing by Nehal Tarek, Abeer D. Algarni, Nancy A. El-Hefnawy, Hatem Abdel-Kader, Amira Abdelatey

    Published 2025-01-01
    “…The second algorithm uses the results of the first algorithm to calculate the running time and energy consumption for each machine in each production line, considering that the production lines of the factory vary in capacity and power, then computes the total energy consumption and presents the results to the decision maker via a dashboard. …”
    Get full text
    Article
  20. 10660