Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
12641
-
12642
-
12643
Detachment of the Subducting Slab in Ancient Subduction Zones Discerned Using Machine Learning
Published 2024-12-01Get full text
Article -
12644
Impact of Indian Ocean Vortices on Convective Activities in Western Indonesian Maritime Continent
Published 2025-05-01Get full text
Article -
12645
Design Considerations for Sub-1-V 1T1C FeRAM Memory Circuits
Published 2024-01-01Get full text
Article -
12646
Hardware/software co-verification of USB3.0 IP core under PowerPC architecture
Published 2022-05-01“…By comparing USB3.0 and USB2.0, USB3.0 has higher transmission rate.By cooperating with the high preformance PowerPC processor, the transfer capability of the USB controller is improved significantly, and ther PowerPC computing resources are fully utilized.This paper describes a programme of USB3.0 IP core based on the PowerPC architecture. …”
Get full text
Article -
12647
MEFET-Based CAM/TCAM for Memory-Augmented Neural Networks
Published 2024-01-01Get full text
Article -
12648
-
12649
Parallel graph-based anomaly detection technique for sequential data
Published 2022-01-01Get full text
Article -
12650
Embedded GPU 3D Panoramic Viewing System Based on Virtual Camera Roaming 3D Environment
Published 2019-01-01“…The core computing module is based on NXP’s i.MX6Q application processor and builds an embedded Linux system. …”
Get full text
Article -
12651
Dynamic Adaptation for Independent Task Scheduling Using Dynamic Programming in Multiprocessor Systems
Published 2025-03-01“… Performance in IT systems is critical to ensuring that systems meet user needs and expectations. In heterogeneous computing systems (HCS), which consist of processors with varying capabilities, dynamic adaptation plays a vital role in maintaining high performance. …”
Get full text
Article -
12652
Improving Performance of Automatic Keyword Extraction (AKE) Methods Using PoS Tagging and Enhanced Semantic-Awareness
Published 2025-07-01“…Automatic keyword extraction (AKE) has gained more importance with the increasing amount of digital textual data that modern computing systems process. It has various applications in information retrieval (IR) and natural language processing (NLP), including text summarisation, topic analysis and document indexing. …”
Get full text
Article -
12653
-
12654
Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
Published 2022-04-01“…Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.…”
Get full text
Article -
12655
Twofold dynamic attention guided deep network and noise-aware mechanism for image denoising
Published 2023-03-01Get full text
Article -
12656
Unleashing the hidden powers of low-cost IoT boards: GPU-based edutainment case study
Published 2022-03-01“…Unfortunately, even with the limited energy consumption and high processing power of such GPUs, CPUs are usually the only computational element utilized by the hosted applications, thus hindering the capabilities of the entire board. …”
Get full text
Article -
12657
ARCHITECTURAL DESIGN USING THE ZACHMAN FRAMEWORK AT MINING EQUIPMENT INDUSTRY
Published 2025-03-01Get full text
Article -
12658
Multi-scale structural similarity index for motion detection
Published 2017-07-01Get full text
Article -
12659
Efficient multi-UAV path planning in dynamic and complex environments using hybrid polar lights optimization
Published 2025-07-01“…Furthermore, parallel processing significantly boosts computational efficiency, especially in high-dimensional and complex scenarios. …”
Get full text
Article -
12660
An Inclusive review on deep learning techniques and their scope in handwriting recognition
Published 2025-05-01“…Nevertheless, the present handwriting recognition survey foresees deep learning enabling changes at both bench and bedside with the potential to transform several domains as image processing, speech recognition, computer vision, machine translation, robotics and control, medical imaging, medical information processing, bio-informatics, natural language processing, cyber security, and many others. …”
Get full text
Article