Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Information technology 3
- Management 3
- Business 2
- Computer programs 2
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
- Design and construction 1
-
13121
-
13122
Shot boundary detection algorithm based on ORB
Published 2013-11-01“…Experi-ment results show that the proposed algorithm is effective to solve false and miss detection caused by the above problems, with a sharp rise in procession speed.…”
Get full text
Article -
13123
Incentivization and Aggregation Schemes for Federated Learning Applications
Published 2023-01-01Get full text
Article -
13124
-
13125
An Efficient Index Building Algorithm for Selection of Aggregator Nodes in Wireless Sensor Networks
Published 2014-04-01“…In wireless sensor networks (WSNs), aggregator nodes perform the data aggregation process. Thus, careful selection of the aggregator nodes is needed to reduce network traffic in data aggregation process and prolong overall lifetime of the network. …”
Get full text
Article -
13126
Nitrous oxide (N<sub>2</sub>O) in Macquarie Harbour, Tasmania
Published 2024-12-01Get full text
Article -
13127
Evaluating machine learning models comprehensively for predicting maximum power from photovoltaic systems
Published 2025-03-01Get full text
Article -
13128
Quantum Resistance Saber-Based Group Key Exchange Protocol for IoT
Published 2025-01-01“…National Institute for Standards and Technology (NIST) standardization process toward developing post-quantum cryptographic tools. …”
Get full text
Article -
13129
Dynamic ReLab: A Binary Path-Based Labeling Scheme for Dynamic XML Data
Published 2025-01-01“…Experimental results on real-world XML datasets demonstrate that although Dynamic ReLab incurs higher overhead during initial label generation, it substantially outperforms traditional schemes in update processing efficiency. This improvement is achieved through innovative techniques, such as hierarchical bit-masking and binary path concatenation, which streamline the update process and ensure the integrity of the XML structure. …”
Get full text
Article -
13130
Guest Editorial: Impact of Integrated Intelligent Information and Analytical Systems on Society
Published 2020-09-01“…The Special Issue of the Journal of Information Technology Management (JITM) is publishing very selective papers on information management, technology in higher education, integrated systems, enterprise management, cultural thoughts, strategic contributions, management information systems, and cloud computing. We received numerous papers for this special issue but after an extensive peer-review process, 10 papers were finally selected for publication. …”
Get full text
Article -
13131
Alloy-based verification of Web service composition
Published 2012-11-01“…Service composition was the core problem of service computing,the validity and reliability of service composition had become the premise of service execution.A method was presented which utilizes the finite state machine (FSM)to model the business process’s state transitions,and described the required properties with Alloy language.Then,Alloy model was used to formalize the service FSM and the required properties of the system.Finally,Alloy Analyzer was used to verify the model that whether the required properties were satisfied.It is shown that the method of Alloy-based verification of the service composition is of good feasibility.…”
Get full text
Article -
13132
Architecture design of multi-protocol controller based on software definition
Published 2020-10-01“…In order to fulfill the requirement of high-performance computing system for software definition interconnected communication,a kind of multi-protocol controller architecture was designed.The architecture supported a variety of protocol specifications and software-defining heterogeneous architecture.The interconnections of Fiber Channel,Ethernet and SRIO were realized by embedding programmable hardware circuits.The work mode of multi-protocol controllers was managed by software definition,which meet the heterogeneous requirements of system applications.The multi-protocol controller of the thesis has been realized in the 40 nm process,that the measurements show that the performance and function satisfy the standard of the three protocols.…”
Get full text
Article -
13133
A Secure COVID Affected CT Scan Image Encryption Scheme Using Hybrid MLSCM for IoMT Environment
Published 2025-01-01Get full text
Article -
13134
Edge intelligence empowered internet of vehicles: concept, framework, issues, implementation, and prospect
Published 2023-03-01“…As an emerging inter discipline field, edge intelligence pushes AI to the side close to the traffic data source.Edge intelligence makes use of the computing power, storage resources, and perception ability of edge to provide a more intelligent and efficient resource allocation and processing mechanism while providing a real-time response, intelligent decision-making and network autonomy, realizing the critical leap for internet of vehicles from access “pipelining” to the intelligent enabling platform of information.However, the successful implementation of edge intelligence in internet of vehicles is still in its infancy, and there exists a demand for a comprehensive survey in this young field from a broader perspective.Based on this context of internet of vehicles, the background, concepts and key technologies of edge intelligence were introduced.Then, a holistic overview of service types based on internet of vehicles was taken, and the entire processes of model training and inference in edge intelligence were elaborated.Finally, to promote the potential research directions, the key open challenges of edge intelligence in the internet of vehicles were analyzed, and the coping strategies were discussed.…”
Get full text
Article -
13135
Continuous Skyline Queries Based on MapReduce
Published 2014-05-01“…With the development of Web and wireless sensor networks, the appearance of big data has brought a great challenge to data query and process. The parallel Skyline computing issue of a moving query object under the MapReduce framework was studied. …”
Get full text
Article -
13136
Continuous Skyline Queries Based on MapReduce
Published 2014-05-01“…With the development of Web and wireless sensor networks, the appearance of big data has brought a great challenge to data query and process. The parallel Skyline computing issue of a moving query object under the MapReduce framework was studied. …”
Get full text
Article -
13137
Blind signal separation algorithm based on temporal predictability and differential search algorithm
Published 2014-06-01“…The source signal component separated was wiped off using deflation method and all the source signals could be recovered successfully by repeating the separation process. Simulation results show that the algorithm can achieve blind separation from mixed signals efficiently with very high separation precision and very low computing time.…”
Get full text
Article -
13138
A Review on Image Enhancement and Restoration Techniques for Underwater Optical Imaging Applications
Published 2023-01-01Get full text
Article -
13139
Empirical Analysis of Honeybees Acoustics as Biosensors Signals for Swarm Prediction in Beehives
Published 2024-01-01Get full text
Article -
13140
ARCHER-a Monte Carlo code for multi-particle radiotherapy through GPU-accelerated simulation and DL-based denoising
Published 2025-01-01“…The computing process involves GPU-based dose calculations that is followed by dCNN-based denoising. …”
Get full text
Article