Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
12821
Self-Stabilization of Grid-Connected Inverters by Means of an Impedance-Based Adaptive Controller
Published 2025-01-01Get full text
Article -
12822
State of energy estimation of lithium-ion battery based on long short-term memory optimization Adaptive Cubature Kalman filter.
Published 2024-01-01“…The safety of LIBs, the development of artificial intelligence, and the increase in computing power have provided possibilities for big data computing. …”
Get full text
Article -
12823
Regularized Least Square Regression with Unbounded and Dependent Sampling
Published 2013-01-01Get full text
Article -
12824
Evaluating language model embeddings for Parkinson’s disease cohort harmonization using a novel manually curated variable mapping schema
Published 2025-06-01“…Abstract Data Harmonization is an important yet time-consuming process. With the recent popularity of applications using Language Models (LMs) due to their high capabilities in text understanding, we investigated whether LMs could facilitate data harmonization for clinical use cases. …”
Get full text
Article -
12825
Knowledge Error Detection via Textual and Structural Joint Learning
Published 2025-02-01Get full text
Article -
12826
Complexity of the Analysis of Financial Cloud Based on Fuzzy Theory in the Wisdom of Sustainable Urban Development
Published 2021-01-01“…First, design a smart city model to analyze the potential security issues of the financial cloud computing system. The security level model of cloud computing establishes an index system for evaluation objects based on the level of the security model and uses expert evaluation methods to build models for all levels of the risk profile through the analysis-level process and establish a fuzzy relationship model for each evaluation object value. …”
Get full text
Article -
12827
High-Volume Battery Recycling: Technical Review of Challenges and Future Directions
Published 2025-02-01Get full text
Article -
12828
Performance of Ferroelectric Materials in the Construction of Smart Manufacturing for the New Infrastructure of Smart Cities
Published 2022-01-01“…Make full use of the advanced form of urban informatization based on the next generation innovation of knowledge society in all walks of life in the city. Cloud computing is a new network application concept. The core concept of cloud computing is to take the Internet as the center, and provide fast and secure cloud computing services and data storage on the website, so that everyone who uses the Internet can use the huge computing resources and data center on the network. …”
Get full text
Article -
12829
Monte Carlo Algorithm For Matrices in Solving Systems of Linear Equations, Determinants, Inverse, Eigen Values, and Eigenvectors.
Published 2024“…Linear algebra operations play an important role in scientific computing and data analysis. With increasing data volume and complexity in the "Big Data" era, linear algebra operations are important tools to process massive datasets. …”
Get full text
Thesis -
12830
Measuring Online Battery AC Resistance Using a DC-DC Converter With Time and Frequency Hybrid Method
Published 2025-01-01“…However, the high FFT resolution in a Digital Signal Processor (DSP) requires a long computation time and Random-Access Memory (RAM) to process large amounts of data. …”
Get full text
Article -
12831
An interpretable deep learning framework for medical diagnosis using spectrogram analysis
Published 2025-12-01Get full text
Article -
12832
Real-time multi-level trust-based secure routing for improved QoS in WSN using blockchain
Published 2025-06-01Get full text
Article -
12833
Mitigating cloud vulnerabilities using a blockchain platform
Published 2025-04-01“…The use of explainable AI techniques adds transparency to the decision-making process, increasing user trust. Hence, the advanced neural networks, coupled with cloud and edge computing, can significantly optimize CBIR systems, making them more robust, scalable, and applicable to a wide range of industries such as healthcare, security, and e-commerce.…”
Get full text
Article -
12834
-
12835
Robust Single Sample Per Person Face Recognition with Probabilistic Illumination Enhancement
Published 2025-07-01Get full text
Article -
12836
-
12837
Discussion on the common sense of the Internet of things
Published 2020-12-01“…The development of Internet of things (IoT) in China is in the second decade.First of all,the outcome of the IoT was reviewed.The industry formation and system structure of IoT were introduced.Then,the development process,trends and key points of the next generation of IoT were summarized in the aspect of the service platform,sensor industry,access links and fusion with technologies such as cloud computing,edge computing,big data,identity resolution,blockchain,satellite navigation system,5G and so on.Finally,the problems and possible ideas of the development of IoT in China were put forward in the fields of the application positioning,theoretical research,standard-setting and security.Hope to provide reference for colleagues to understand the IoT.…”
Get full text
Article -
12838
Frequency modulation on magnons in synthetic dimensions
Published 2025-04-01“…Abstract Magnons are promising candidates for next-generation computing architectures, offering the ability to manipulate their amplitude and phase for information encoding. …”
Get full text
Article -
12839
Securable networked scheme with face authentication
Published 2022-03-01“…Wide applications are associated with a large amount of data transmission so that edge computing is inspired accordingly. In this research task, the major goal of edge computing is to handover a part of the computing work to the terminal equipment; the server only needs to process the results of final return. …”
Get full text
Article -
12840
Deep learning in the fog
Published 2019-08-01“…This way, we pinpoint the odds and risks of artificial intelligence fog computing and help in the process of selecting suitable architecture and components that will satisfy all requirements defined by the complex Internet of Things systems.…”
Get full text
Article