Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
12701
-
12702
-
12703
-
12704
Copy-move forgery detection using binary discriminant features
Published 2022-02-01“…Experimental results show that the proposed method has better detection accuracy, in terms of precision, recall and F1 Score, when compared with the state-of-the-art methods of copy-move forgery detection, under conditions of plain copy-move forgery as well as post-processing conditions like brightness changes, contrast adjustments, color reduction and blurring.…”
Get full text
Article -
12705
IoT-edge anomaly detection for covariate shifted and point time series health data
Published 2022-11-01Get full text
Article -
12706
Lightweight detection of cotton leaf diseases using StyleGAN2-ADA and decoupled focused self-attention
Published 2025-05-01“…The Layer-Adaptive Magnitude-based Pruning (LAMP) method reduces computational and memory demands, and the teacher-assistant-student architecture further improves accuracy through knowledge distillation. …”
Get full text
Article -
12707
-
12708
-
12709
Romanized Tunisian dialect transliteration using sequence labelling techniques
Published 2022-03-01Get full text
Article -
12710
Multi-level fusion with fine-grained alignment for multimodal sentiment analysis
Published 2025-06-01Get full text
Article -
12711
SMOTE-LOF for noise identification in imbalanced data classification
Published 2022-06-01Get full text
Article -
12712
A novel transformer-based dual attention architecture for the prediction of financial time series
Published 2025-06-01Get full text
Article -
12713
Graph-based reinforcement learning for software-defined networking traffic engineering
Published 2025-07-01“…This paper proposes GRL-TE (Graph-based Reinforcement Learning for Traffic Engineering), a novel framework that achieves near-optimal performance while maintaining computational efficiency across diverse network scales. …”
Get full text
Article -
12714
Robust and Swift Iris Recognition at distance based on novel pupil segmentation
Published 2022-11-01Get full text
Article -
12715
Low-overhead defect-adaptive surface code with bandage-like super-stabilizers
Published 2025-05-01“…However, a major challenge arises from defects in processor fabrication, as well as occasional losses or cosmic rays during the computing process, all of which can lead to qubit malfunctions and disrupt error-correcting codes’ normal operations. …”
Get full text
Article -
12716
Bias-field digitized counterdiabatic quantum algorithm for higher-order binary optimization
Published 2025-08-01“…Our results show that BF-DCQO offers an effective path for solving large-scale HUBO problems on current and near-term quantum processors.…”
Get full text
Article -
12717
Study on Key Technologies of Intelligent IoT Device
Published 2015-08-01“…Smart IoT devices go into product stage from hype stage.Sensors are being miniaturized,integrated,intelligent and diversified,turn the reality into digital.IoT device’s intelligent is based on power of processor and advanced operation system,and be enhanced by the cloud computing and big data.As smart phone,the smart IoT devices need to build an active ecosystem that engage developers to innovate.The several key technologies development status and future trends were explored,analyzed,and displayed.…”
Get full text
Article -
12718
Heterogeneous bioinformatic data encryption on portable devices
Published 2025-04-01“…For mobile devices, encryption is even more important yet more challenging, as these devices are usually used in environments that may not be well protected and have rather limited computing resources. With heterogeneous multi-core processors becoming popular on mobile devices to satisfy different needs of applications, designing heterogeneous algorithms to harness all the available resources are tricky but have the potential to deliver high performance. …”
Get full text
Article -
12719
Application of Grouped MCDM Technique for Ranking and Selection of Laptops in the Current Scenario of COVID-19
Published 2023-08-01“…This paper exhibits a group of two MCDM techniques; Best Worst Method (BWM) and Analytical Hierarchy Process (AHP), which have been used to evaluate relative weights of considered conflicting criteria such as brand, price, storage capacity, RAM, processor, weight, touch screen, Bluetooth, and screen size, and these weights are used in the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) for ranking and selecting the best product of laptops.…”
Get full text
Article -
12720
FalconSign: An Efficient and High-Throughput Hardware Architecture for Falcon Signature Generation
Published 2024-12-01“…Our approach involves a new scheduling flow and architecture for Fast-Fourier Sampling to enhance computing unit reuse and reduce processing time. Additionally, we introduce several optimized modules, including configurable randomness generation units, parallel floating-point processing units, and an optimized SamplerZ module, to improve execution efficiency. …”
Get full text
Article