Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
10641
SVM directed machine learning classifier for human action recognition network
Published 2025-01-01“…However, existing approaches such as three-dimensional convolutional neural networks (3D CNN) and two-stream neural networks (2SNN) have computational hurdles due to the significant parameterization they require. …”
Get full text
Article -
10642
An empirical study of LLaMA3 quantization: from LLMs to MLLMs
Published 2024-12-01“…Abstract The LLaMA family, a collection of foundation language models ranging from 7B to 65B parameters, has become one of the most powerful open-source large language models (LLMs) and the popular LLM backbone of multi-modal large language models (MLLMs), widely used in computer vision and natural language understanding tasks. …”
Get full text
Article -
10643
Graph Neural Network-Based Approach for Detecting False Data Injection Attacks on Voltage Stability
Published 2025-01-01Get full text
Article -
10644
-
10645
-
10646
Leveraging two-dimensional pre-trained vision transformers for three-dimensional model generation via masked autoencoders
Published 2025-01-01“…Masking autoencoding is a promising self-supervised learning approach that greatly advances computer vision and natural language processing. For robust 2D representations, pre-training with large image data has become standard practice. …”
Get full text
Article -
10647
Design of High Performance Hybrid Type Digital-Feedback Low Drop-Out Regulator Using SSCG Technique
Published 2021-01-01Get full text
Article -
10648
SGCL-LncLoc: An Interpretable Deep Learning Model for Improving lncRNA Subcellular Localization Prediction with Supervised Graph Contrastive Learning
Published 2024-09-01“…Additionally, we propose a computational method to map the attention weights of the graph nodes to the weights of nucleotides in the lncRNA sequence, allowing SGCL-LncLoc to serve as an interpretable deep learning model. …”
Get full text
Article -
10649
Enhancing Drought Forecast Accuracy Through Informer Model Optimization
Published 2025-01-01Get full text
Article -
10650
Gradient diffusion entropy corrected ALNS optimization for vegetation topology interaction networks
Published 2025-01-01Get full text
Article -
10651
-
10652
-
10653
Snake-DETR: a lightweight and efficient model for fine-grained snake detection in complex natural environments
Published 2025-01-01“…Compared to other state-of-the-art models, Snake-DETR achieved an accuracy of 97.66%, a recall rate of 93.92%, mAP@0.5 of 95.23%, and mAP@0.5:0.95 of 72.15%, all outperforming other algorithms in the comparative tests. Furthermore, the computational load and parameter count of the model are reduced by 47.2 and 52.2%, respectively, compared to the benchmark model. …”
Get full text
Article -
10654
Dynamic Key Replacement Mechanism for Lightweight Internet of Things Microcontrollers to Resist Side-Channel Attacks
Published 2025-01-01“…The lightweight D-H key exchange ensures that even resource-constrained IoT devices can securely perform key exchanges without significant computational overhead. Experimental results demonstrate the practicality and security of the proposed mechanism, achieving key updates with minimal time overhead, ranging from 12 to 50 milliseconds per encryption transmission. …”
Get full text
Article -
10655
THE DETERMINATION OF THE SHARPNESS DEPTH BORDERS AND CORRESPONDING PHOTOGRAPHY AND VIDEO RECORDING PARAMETERS FOR CONTEMPORARY VIDEO TECHNOLOGY
Published 2015-04-01“…The method of determination of the sharpness depth borders was improved for contemporary video technology. The computer programme for determination of corresponding video recording parameters was created.…”
Get full text
Article -
10656
The Boolean zeta function
Published 2005-12-01“…., xm) function known in theoretical computer science. …”
Get full text
Article -
10657
Extracting Skeleton of the Global Terrorism Network Based on m-Modified Topology Potential
Published 2020-01-01Get full text
Article -
10658
Zero-day exploits detection with adaptive WavePCA-Autoencoder (AWPA) adaptive hybrid exploit detection network (AHEDNet)
Published 2025-02-01“…Abstract This paper introduces a new probabilistic composite model for the detection of zero-day exploits targeting the capabilities of existing anomaly detection systems in terms of accuracy, computational time, and adaptability. To address the issues mentioned above, the proposed framework consisted of three novel elements. …”
Get full text
Article -
10659
Knowledge Graph-Enhanced Digital Twin Framework for Optimized Job Shop Scheduling in Smart Manufacturing
Published 2025-01-01“…The second algorithm uses the results of the first algorithm to calculate the running time and energy consumption for each machine in each production line, considering that the production lines of the factory vary in capacity and power, then computes the total energy consumption and presents the results to the decision maker via a dashboard. …”
Get full text
Article -
10660
STGAN: Swin Transformer-Based GAN to Achieve Remote Sensing Image Super-Resolution Reconstruction
Published 2024-12-01Get full text
Article