Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
2841
Models and methods for analyzing complex networks and social network structures
Published 2023-04-01Subjects: Get full text
Article -
2842
Development of a Low-Intensity Light Imaging Probe for Childbirth Cervical Dilation Image Acquisition
Published 2023-01-01Subjects: Get full text
Article -
2843
Implementation of Machine Vision Methods for Cattle Detection and Activity Monitoring
Published 2025-03-01Subjects: Get full text
Article -
2844
Automatic Timbre Transformation Using Enhanced Diffusion Model
Published 2025-01-01Subjects: “…Audio signal processing…”
Get full text
Article -
2845
Dust Battery: A Novel Mechanism for Seed Magnetic Field Generation in the Early Universe
Published 2025-01-01Subjects: Get full text
Article -
2846
Accurate and Efficient Fluid Flow Regime Classification Using Localized Texture Descriptors and Machine Learning
Published 2025-01-01Subjects: “…Image processing…”
Get full text
Article -
2847
AM3: An Open-source Tool for Time-dependent Lepto-hadronic Modeling of Astrophysical Sources
Published 2024-01-01Subjects: “…Computational methods…”
Get full text
Article -
2848
A Study on an Experimental System of Wiper–Windshield Friction Vibration and Noise
Published 2025-07-01Subjects: “…data acquisition and processing…”
Get full text
Article -
2849
A Survey on Deepfake Video Detection
Published 2021-11-01Subjects: “…computer crime…”
Get full text
Article -
2850
Neurosurgical and BCI approaches to visual rehabilitation in occipital lobe tumor patients
Published 2024-12-01Subjects: Get full text
Article -
2851
Selected methods of pathological speech signal analysis
Published 2014-04-01Subjects: Get full text
Article -
2852
MODELING AS A METHOD FOR SCIENTIFIC COGNITION OF COMPLEX MEAT SYSTEMS
Published 2017-10-01Subjects: “…computer modeling…”
Get full text
Article -
2853
Automatic summarization of cooking videos using transfer learning and transformer-based models
Published 2025-01-01Subjects: Get full text
Article -
2854
Edge Cloud Resource Scheduling with Deep Reinforcement Learning
Published 2025-04-01“…Moreover, we develop innovative reward functions and concurrent processing mechanisms to minimize training time. Furthermore, we enhance the Proximal Policy Optimization (PPO) algorithm to improve adaptability, increase the accuracy of likelihood ratio estimation, identify a more suitable activation function, and impose constraints on gradient updates. …”
Get full text
Article -
2855
Exploring Smartphone-Based Edge AI Inferences Using Real Testbeds
Published 2025-05-01“…To empirically answer this, we use three pre-trained DL models and eight heterogeneous edge nodes including five low/mid-end smartphones and three SBCs, and compare the performance achieved using workloads from three image stream processing scenarios. Experiments were run with the help of a toolset designed for reproducing battery-driven edge computing tests. …”
Get full text
Article -
2856
-
2857
Feature-Frequency–Adaptive On-line Training for Fast and Accurate Natural Language Processing
Published 2021-03-01Get full text
Article -
2858
An Improved Ant Colony Optimization Approach for Optimization of Process Planning
Published 2014-01-01“…Computer-aided process planning (CAPP) is an important interface between computer-aided design (CAD) and computer-aided manufacturing (CAM) in computer-integrated manufacturing environments (CIMs). …”
Get full text
Article -
2859
Calculation of coal cleats spacing for methane degassing by image processing
Published 2025-01-01“…Computer-based image processing technology was conducted to determine the coal cleats. …”
Get full text
Article -
2860
Overview of control-flow hijacking attack and defense techniques for process
Published 2019-12-01“…Control flow hijacking attack is a common attack against computer software,which brings great harm to computer software security and is a research hotspot in the field of information security.Firstly,from the perspective of the source of attack code,the related research was expounded on process’s control flow hijacking attack.Secondly,according to the newest development status of control flow hijacking attack technology,the related defense technologies at home and abroad were introduced based on different defense ideas.Finally,the development trend of control flow hijacking offensive and defensive technology were summarized.…”
Get full text
Article