Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
3321
Intrusion Detection-Data Security Protection Scheme Based on Particle Swarm-BP Network Algorithm in Cloud Computing Environment
Published 2023-01-01“…Aiming at the problems of low detection rate and high false detection rate of intrusion detection algorithms in the traditional cloud computing environment, an intrusion detection-data security protection scheme based on particle swarm-BP network algorithm in a cloud computing environment is proposed. …”
Get full text
Article -
3322
Tactile near-sensor computing systems incorporating hourglass-shaped microstructured capacitive sensors for bio-realistic energy efficiency
Published 2025-05-01“…Abstract Bio-inspired near-sensor computing, which integrates sensing and processing functions, presents a promising strategy to enhance efficiency and reduce latency in such applications. …”
Get full text
Article -
3323
-
3324
Enhancing Data Privacy Protection and Feature Extraction in Secure Computing Using a Hash Tree and Skip Attention Mechanism
Published 2024-11-01“…The hash tree is employed to ensure data integrity and security, enabling the rapid verification of data changes, while the skip attention mechanism enhances computational efficiency by allowing the model to selectively focus on important features, thus minimizing unnecessary processing. …”
Get full text
Article -
3325
A KWS System for Edge-Computing Applications with Analog-Based Feature Extraction and Learned Step Size Quantized Classifier
Published 2025-04-01“…Edge-computing applications demand ultra-low-power architectures for both feature extraction and classification tasks. …”
Get full text
Article -
3326
Beyond boundaries a hybrid cellular potts and particle swarm optimization model for energy and latency optimization in edge computing
Published 2025-02-01“…Abstract The need to compute data in real-time and manage resources in environments with distributed computing has given edge computing significant importance. …”
Get full text
Article -
3327
Towards Secure IoT Authentication System Based on Fog Computing and Blockchain Technologies to Resist 51% and Hijacking Cyber-Attacks
Published 2025-04-01“…Despite its significant benefits for modern smart healthcare, IoHT faces growing security challenges due to the limited processing power, storage capacity, and self-defense capabilities of its devices. …”
Get full text
Article -
3328
-
3329
-
3330
-
3331
DNFE: Directed network flow entropy for detecting tipping points during biological processes.
Published 2025-07-01Get full text
Article -
3332
Trajectory inference from single-cell genomics data with a process time model.
Published 2025-01-01Get full text
Article -
3333
-
3334
A vibration signal processing method based on SE-PSO-VMD for ultrasonic machining
Published 2024-12-01Get full text
Article -
3335
Sum and Tensor of Quantitative Effects
Published 2024-10-01“…Finally, as an application, we provide the first quantitative algebraic axiomatizations to the following coalgebraic structures: Markov processes, labelled Markov processes, Mealy machines, and Markov decision processes, each endowed with their respective bisimilarity metrics. …”
Get full text
Article -
3336
RN‐Net: Reservoir Nodes‐Enabled Neuromorphic Vision Sensing Network
Published 2024-12-01“…Neuromorphic computing systems promise high energy efficiency and low latency. …”
Get full text
Article -
3337
Influence of proteinoids on calcium carbonate polymorphs precipitation in supersaturated solutions
Published 2025-01-01“…Proteinoids, or thermal proteins, are amino acid polymers formed at high temperatures by non-biological processes. Pro- teinoids form microspheres in liquids. …”
Get full text
Article -
3338
U-SCAD: An Unsupervised Method of System Call-Driven Anomaly Detection for Containerized Edge Clouds
Published 2025-05-01“…Moreover, our method can effectively reduce the original processing data to 13%, which means that it significantly lowers the cost of computing resources.…”
Get full text
Article -
3339
Automatic Phase Correction of NMR Spectra Using Brute-Force GPU Method
Published 2025-03-01Get full text
Article -
3340
A model for correlation-based choreographic programming
Published 2024-12-01“…To provide its correctness guarantee, Applied Choreographies comes with a compilation procedure that transforms a choreography into a low-level, implementation-adherent calculus of Service-Oriented Computing (SOC). To manage the complexity of the compilation, we divide its formalisation and proof into three stages, respectively dealing with: (a) the translation of name-based communications into their SOC equivalents, namely, using correlation mechanisms based on message data; (b) the projection of the given choreography into a composition of partial, single-participant choreographies (towards their translation into SOC processes); (c) the translation of partial choreographies and the distribution of global, choreography-level state into local SOC processes. …”
Get full text
Article