Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
2541
A Very Compact AES-SPIHT Selective Encryption Computer Architecture Design with Improved S-Box
Published 2013-01-01Get full text
Article -
2542
Language Learning, Representation, and Processing in Humans and Machines: Introduction to the Special Issue
Published 2024-10-01Get full text
Article -
2543
Exceptions, Instantiations, and Overgeneralization: Insights into How Language Models Process Generics
Published 2024-10-01Get full text
Article -
2544
Nonlocal phase-change metaoptics for reconfigurable nonvolatile image processing
Published 2025-05-01“…Abstract The next generation of smart imaging and vision systems will require compact and tunable optical computing hardware to perform high-speed and low-power image processing. …”
Get full text
Article -
2545
Educational process mining: literature classification, gaps, and emerging opportunities
Published 2025-06-01Get full text
Article -
2546
Hardware Implementation of Block Floating-Point FFT Based on Approximate Computation and Conflict-Free Access
Published 2025-01-01“…This paper proposes a novel Fast Fourier Transform hardware architecture for natural-order multi-input multi-output processing, which is based on approximate computing and the block floating-point data format. …”
Get full text
Article -
2547
An Area-Efficient Continuous-Time Ising Machine Featuring Dynamic Threshold Annealing
Published 2025-01-01“…In this work, we present a CT Ising machine with an eDRAM-based in-memory computing architecture. The design introduces a neighboring spin computation-sharing architecture that halves the storage overhead of interaction coefficients, thereby significantly reducing the spin cell area. …”
Get full text
Article -
2548
Toward the Bayesian brain: a generative model of information transmission by vestibular sensory neurons
Published 2024-12-01Subjects: Get full text
Article -
2549
Peculiarities of teaching students with mosaic thinking
Published 2017-05-01Subjects: “…organization of education process…”
Get full text
Article -
2550
PREDICTING THE LEARNING PATH TO LEARNER’S OPTIMUM COMPREHENSION
Published 2024-04-01Subjects: Get full text
Article -
2551
Structured Shared Spaces as a Basis for Building Business Process Support Systems: A Generic Model and Analysis of Examples
Published 2018-10-01“…Though the concept of shared spaces had been known in Groupware and Computer Supported Cooperative Work (CSCW) for quite a while, it did not become popular until the arrival of the Internet and social software. …”
Get full text
Article -
2552
A Process Tree-Based Incomplete Event Log Repair Approach
Published 2025-05-01Get full text
Article -
2553
MPJ-SPARK Integration-Based Technique to Enhance Big Data Analytics in High Performance Computing Environments
Published 2025-01-01“…Each worker operates with an isolated Spark driver, processes tasks independently, and returns results to the root process for aggregation. …”
Get full text
Article -
2554
Evaluating CPU, GPU, and FPGA performance in the context of modal reverberation: a comparative analysis
Published 2025-04-01“…By leveraging their respective architectures, these processors are assessed for their ability to manage the high computational demands of modal synthesis. …”
Get full text
Article -
2555
Flow-of-traffic prediction program based mobile edge computing for Internet of vehicles using double auction
Published 2020-12-01“…With an aim of maximizing the efficiency of edge offloading and the resource utilization of edge computing server simultaneously, a new flow-of-traffic prediction based edge computing offloading solution was proposed for Internet of vehicles (IoV).Firstly, both the efficiency utility function of vehicle and the resource utilization of mobile edge computing (MEC) server were established by considering task priority.Next, the formulated dual-objective optimization problem was transformed into a double auction problem between vehicles and MEC servers.Finally, based on the designed flow-of-traffic based pricing function of vehicle and MEC server, a McAfee auction algorithm was adopted to complete the edge computing process.Simulation results show that benefiting from the flow-of-traffic prediction information, the proposed solution can significantly improve both the efficiency of computation offloading and the utilization of computation resource.…”
Get full text
Article -
2556
Privacy-Preserving Data Sharing and Computing for Outsourced Policy Iteration with Attempt Records from Multiple Users
Published 2025-02-01“…In the actual use of this process, the computing resources possessed by a single user are limited so that the cooperation of multiple users are needed, but the joint learning of multiple users introduces the problem of privacy leakage. …”
Get full text
Article -
2557
Analysis of LMS Implementation Success Based on Information System Success and End-User Computing Satisfaction Models
Published 2025-08-01“…After collecting the data, the next step is to process it using the SEM-PLS multivariate analysis technique, which includes validating the measurement model as well as the structural model. …”
Get full text
Article -
2558
A Novel Image Encryption Algorithm Based on a Fractional-Order Hyperchaotic System and DNA Computing
Published 2017-01-01“…To further enhance the security of image, in this paper, we propose a novel algorithm that combines the fractional-order hyperchaotic Lorenz system and DNA computing (FOHCLDNA) for image encryption. Specifically, the algorithm consists of four parts: firstly, we use a fractional-order hyperchaotic Lorenz system to generate a pseudorandom sequence that will be utilized during the whole encryption process; secondly, a simple but effective diffusion scheme is performed to spread the little change in one pixel to all the other pixels; thirdly, the plain image is encoded by DNA rules and corresponding DNA operations are performed; finally, global permutation and 2D and 3D permutation are performed on pixels, bits, and acid bases. …”
Get full text
Article -
2559
Polarity-tunable dye-sensitized optoelectronic artificial synapses for physical reservoir computing-based machine vision
Published 2025-05-01“…Abstract Conventional machine vision systems process huge time-series data per second, presenting significant challenges for edge-device applications due to limitations in data transfer and storage. …”
Get full text
Article -
2560
Risk management strategy for generative AI in computing education: how to handle the strengths, weaknesses, opportunities, and threats?
Published 2024-12-01“…Findings of the study have both theoretical and practical implications for computing education specifically, and higher education in general. …”
Get full text
Article