Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
13381
Formal Verification of Business Constraints in Workflow-Based Applications
Published 2024-12-01“…Workflows coordinate a series of computing tasks to create a sophisticated workflow logic. …”
Get full text
Article -
13382
Application of the methodology of readiness levels for the lean development of digital twins of complex engineering systems
Published 2020-03-01“…Due to the complexity of full-scale object modeling and the need to use advanced computing technologies, the digital twin development process may require significant time, financial and human resources. …”
Get full text
Article -
13383
Use of hybrid quantum-classical algorithms for enhancing biomarker classification.
Published 2025-01-01“…Quantum machine learning (QML) combines quantum computing with machine learning, offering potential for solving intricate problems. …”
Get full text
Article -
13384
Research on enterprise digital transformation: A case study of Alibaba
Published 2024-01-01“…According to the research results of this paper, it is suggested that in the future digital transformation process, enterprises should strengthen investment in digital infrastructure and talent training, which is the most fundamental step of digital transformation.…”
Get full text
Article -
13385
Multi-version consolidation method for block-level backup data
Published 2011-01-01“…Historical version backup data query efficiency was dependent on the version chain length in a multi-version backup data storage system.A novel block-level backup data multi-version consolidation method was presented for this problem.Any version of a historical full system snapshot could be generated within the incremental backup data version sequence.Theoretical analysis showed that it could increase the target snapshot version query efficiency significantly in the version chain.A variable-length block version merging algorithm was presented to decrease the computing complex-ity in the process of snapshot version merging,according to the block-level backup data distribution features.Finally,the concrete applications and performance analysis for block-level version consolidation method was also introduced.The simulated experiments results expose that the version consolidation method can eliminate redundant version of backup data with the same version chain length,and it can increase full system recovery efficiency than traditional methods sig-nificantly.…”
Get full text
Article -
13386
Model Building and Simulation of the Electric Brake Energy of Urban Rail Vehicle
Published 2011-01-01“…By analyzing conditions that urban rail vehicles in the traction power supply network occur the regenerative braking or resistor braking in electric braking process, and depending on the grouping of vehicles, lines, load, run strategy, operation plans, traction power supply and other basic conditions, based on single vehicle computing model and multi-vehicles power supply network model, electric braking energy distribution model were established and simulation were carried out. …”
Get full text
Article -
13387
TraIL: Pinpoint Trajectory for Indoor Localization
Published 2015-11-01“…Indoor localization on smartphones is an enabler for a number of ubiquitous and mobile computing applications attracting worldwide attentions. …”
Get full text
Article -
13388
Torsion point attacks on ‘SIDH‐like’ cryptosystems
Published 2023-03-01“…The best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman protocol (SIDH); this protocol was turned into the CCA‐secure key encapsulation mechanism SIKE, which was submitted to and remains in the third round of NIST's post‐quantum standardisation process as an ‘alternate’ candidate. Isogeny‐based cryptography generally relies on the conjectured hardness of computing an isogeny between two isogenous elliptic curves, and most cryptanalytic work referenced on SIKE's webpage exclusively focusses on that problem. …”
Get full text
Article -
13389
Flipping the Classroom for higher Education Learners to Improve Productive and Receptive Skills
Published 2020-01-01“…Overall, the results of the study have shown the positive impact of this method on the teaching/learning process in the EFL classes for Tourism students, contributing to their motivation and development of their professional skills.…”
Get full text
Article -
13390
Scalable 5G NR Rate-Matcher and Rate-Dematcher for Efficient Use in FPGA Accelerators
Published 2025-01-01“…However, implementing upper physical layer (PHY) processing on off-the-shelf hardware alone might cause inefficient usage of the server processors. …”
Get full text
Article -
13391
-
13392
-
13393
Towards a Unified Framework for Software-Hardware Integration in Evolutionary Robotics
Published 2024-10-01Get full text
Article -
13394
A Lightweight YOLOv8s Algorithm for Ceiling Fan Blade Defect Detection With Optimized Pruning and Knowledge Distillation
Published 2025-01-01“…Detecting these surface defects is crucial; however, accurate and rapid detection typically involves complex machine vision algorithms, such as You Only Look Once (YOLO) networks, that require considerable computing resources, which contradicts the industry’s preference for simpler algorithms that can be deployed using low-cost computing power. …”
Get full text
Article -
13395
Harnessing optimization with deep learning approach on intelligent transportation system for anomaly detection in pedestrian walkways
Published 2025-05-01“…The presented HODLAITS-ADPW method utilizes the CV and DL process to detect pedestrians accurately. To attain this, the HODLAITS-ADPW method performs image pre-processing using Median Filtering to enrich the quality of input frames. …”
Get full text
Article -
13396
Reconfigurable optical synaptic weighting engine using a liquid crystal-based multimode interference coupler
Published 2025-07-01“…Artificial neural networks (ANNs) have become ubiquitous in high-performance information processing. However, conventional electronic hardware, based on the sequential Von Neumann architecture, struggles to efficiently support ANN computations due to their inherently massive parallelism. …”
Get full text
Article -
13397
-
13398
Advanced KNN-based cost-efficient algorithm for precision localization and energy optimization in dynamic underwater sensor networks
Published 2025-01-01“…Furthermore, the study employs the KNN-based cost-efficient method to predict nodes’ orientation in dynamic water conditions, thereby facilitating the mapping of the shortest distance between sensor nodes during the underwater context acquisition process. The effectiveness of the proposed KNN-based cost-efficient method is evaluated through real-time experiments conducted in a water tank setup and simulations using the Ns-3.37 version. …”
Get full text
Article -
13399
High Performance Frequent Subgraph Mining on Transaction Datasets: A Survey and Performance Comparison
Published 2019-09-01“…Later, Google’s MapReduce model with the Hadoop framework proved to be a major breakthrough in high performance large batch processing. Although MapReduce came with many benefits, its disk I/O and non-iterative style model could not help much for FSM domain since subgraph mining process is an iterative approach. …”
Get full text
Article -
13400
IDBR: Interaction-Aware Dual-Granularity Learning for Bundle Recommendation
Published 2025-05-01Get full text
Article