Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
2141
Efficient Brain Tumor Segmentation for MRI Images Using YOLO-BT
Published 2025-06-01Subjects: Get full text
Article -
2142
Development of the course of process management of the enterprise with the use of free software
Published 2018-05-01“…The goal of the search is to develop teaching methods of the process approach to enterprise management, which involves the execution of business process instances in a computer environment. …”
Get full text
Article -
2143
AI-Enhanced Robotic Process Automation: A Review of Intelligent Automation Innovations
Published 2025-01-01Get full text
Article -
2144
Discovering hierarchical process models: an approach based on events partitioning
Published 2024-09-01“…Process mining is a field of computer science that deals with the discovery and analysis of process models based on automatically generated event logs. …”
Get full text
Article -
2145
Teaching methods of work with data in the course of process management
Published 2016-12-01“…The purpose of research is the development of a distance training method to teach students to work with data, used in the training course of process approach to the enterprise management. A difficult point in teaching development of business-processes that involve the execution of business-process instances in the enterprise computer environment is the interaction of business processes with data in cases where process management is taught to students, studying in the field of business information technology or financial and accounting professions. …”
Get full text
Article -
2146
Modelling of Water Quality: An Application to a Water Treatment Process
Published 2012-01-01Get full text
Article -
2147
Learning Representations for Weakly Supervised Natural Language Processing Tasks
Published 2024-05-01Get full text
Article -
2148
PyNET-Q×Q: An Efficient PyNET Variant for Q×Q Bayer Pattern Demosaicing in CMOS Image Sensors
Published 2023-01-01“…Deep learning-based image signal processor (ISP) models for mobile cameras can generate high-quality images that rival those of professional DSLR cameras. …”
Get full text
Article -
2149
Implementation of A Geographically Integrated On-Demand Computer Service System Using the KNN Method
Published 2025-07-01“…Difficult access for customers with limited mobility, the lack of location-based partner distribution, and the manual partner search process remain major challenges in conventional computer service. …”
Get full text
Article -
2150
Parallel Jacobian Computation Based on Distance-2 Algorithm and Its Application in Coupling Problems
Published 2024-06-01“…The Jacobian coloring and Jacobian computing based on this method were tested under a different number of processors. …”
Article -
2151
16-channel photonic solver for optimization problems on a silicon chip
Published 2025-03-01“…The photonic chip is employed to perform the optical vector-matrix multiplication (OVMM) to calculate the cost function of the QUBO problem, while the electronic processor runs the heuristic algorithm to search for the optimal solution. …”
Get full text
Article -
2152
A Bayesian Network under Strict Chain Model for Computing Flow Risks in Smart City
Published 2020-01-01Get full text
Article -
2153
Computational Fluid Dynamics calculation of a planar solid oxide fuel cell design running on syngas
Published 2017-12-01Get full text
Article -
2154
Research on intrusion response strategy based on static Bayesian game in mobile edge computing network
Published 2023-02-01“…In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion detection network structure suitable for mobile edge computing environment was proposed and an intrusion response decision model based on static Bayesian game was established to simulate the network interaction behavior between edge nodes and external intruders.The probability of attackers and defenders in the game process was predicted respectively.The influence of the system resource, the cost of intrusion response, the detection rate and false alarm rate were considered comprehensively by the intrusion response decision model.The response decision of the intrusion detection system was optimized on the basis of the considering both resource consumption of the intrusion detection and the privacy protection of the edge nodes.The factors that affected the decision-making of intrusion response were analyzed, and the experimental basis for the specific application was provided.…”
Get full text
Article -
2155
Research on intrusion response strategy based on static Bayesian game in mobile edge computing network
Published 2023-02-01“…In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion detection network structure suitable for mobile edge computing environment was proposed and an intrusion response decision model based on static Bayesian game was established to simulate the network interaction behavior between edge nodes and external intruders.The probability of attackers and defenders in the game process was predicted respectively.The influence of the system resource, the cost of intrusion response, the detection rate and false alarm rate were considered comprehensively by the intrusion response decision model.The response decision of the intrusion detection system was optimized on the basis of the considering both resource consumption of the intrusion detection and the privacy protection of the edge nodes.The factors that affected the decision-making of intrusion response were analyzed, and the experimental basis for the specific application was provided.…”
Get full text
Article -
2156
Granular computing-driven two-stage consensus model for large-scale group decision-making
Published 2025-06-01Get full text
Article -
2157
Stage-based colorectal cancer prediction on uncertain dataset using rough computing and LSTM models
Published 2024-11-01“…Abstract Artificial intelligence (AI) is an attractive field of Computer Science that helps to classify and to predict various real-time applications. …”
Get full text
Article -
2158
Analisis Kinerja Jaringan Sensor Nirkabel untuk Edge Computing Menggunakan LORA SX1278
Published 2021-10-01“…The sensing process can be done by using various sensors as needed, while the technology for processing the sensing node is called Edge Computing technology. …”
Get full text
Article -
2159
Effects of AlOx Sub‐Oxide Layer on Conductance Training of Passive Memristor for Neuromorphic Computing
Published 2025-05-01“…Abstract Memristors are recognized as crucial devices for the hardware implementation of neuromorphic computing. The conductance training process of memristors has a direct impact on the performance of neuromorphic computing. …”
Get full text
Article -
2160