Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
13561
-
13562
-
13563
Toward a learnable Artificial Intelligence Model for Aerosol Chemistry and Interactions (AIMACI) based on the Multi-Head Self-Attention algorithm
Published 2025-06-01“…While artificial intelligence (AI) has demonstrated potential in accelerating photochemistry simulations, it has not been applied for simulating the full ACI processes, which encompass not only chemical reactions but also other processes, such as nucleation and coagulation. …”
Get full text
Article -
13564
Intelligent IoT Surveillance and Instantaneous Management
Published 2025-06-01“…By extending storage and computation to the network’s edge, fog computing offers a valuable tool for merging intricately linked processing systems. …”
Get full text
Article -
13565
A BOX-YOLOv8 framework for automated hyperspectral core analysis
Published 2025-06-01Get full text
Article -
13566
Cancelable Multi-Branch Deep Learning Framework for Privacy-Preserving ECG Biometric Authentication
Published 2025-01-01Get full text
Article -
13567
Transformer-based prototype network for Chinese nested named entity recognition
Published 2025-06-01Get full text
Article -
13568
The Study of Optical and Electrical Properties of Short-Pitch Plasmonic Solar Cells
Published 2016-01-01Get full text
Article -
13569
Vehicle Authentication-Based Resilient Routing Algorithm With Dynamic Task Allocation for VANETs
Published 2024-01-01“…There are constraints in VANET regarding processing power, bandwidth, time, and high-speed mobility in vehicles. …”
Get full text
Article -
13570
Drug discovery and mechanism prediction with explainable graph neural networks
Published 2025-01-01Get full text
Article -
13571
Sequential and Programmable Squeezing Gates for Optical Non-Gaussian Input States
Published 2025-01-01“…This platform is compatible with other non-Gaussian states and can in principle realize large-scale universal quantum computing by incorporating other existing processing technologies.…”
Get full text
Article -
13572
New Step in Lightweight Medical Image Encryption and Authenticity
Published 2025-05-01Get full text
Article -
13573
Comprehensive datasets for RNA design, machine learning, and beyond
Published 2025-07-01“…Abstract RNA molecules are essential in regulating biological processes such as gene expression, cellular differentiation, and development. …”
Get full text
Article -
13574
H-Darrieus Wind Turbine with Blade Pitch Control
Published 2009-01-01“…A procedure for computing the optimal variation of the blades' pitch angle of an H-Darrieus wind turbine that maximizes its torque at given operational conditions is proposed and presented along with the results obtained on a 7 kW prototype. …”
Get full text
Article -
13575
Numerical study of crack path by MMCG specimen using M integral
Published 2015-12-01“…The main goal of this geometry is to propose a decrease of the energy release rate during the crack growth process. In this case, the fracture parameters can be decoupled into Mode I and Mode II in order to determine the impact of time during creep crack test. …”
Get full text
Article -
13576
A Mobility-Aware Efficient Routing Scheme for Mobile Sensor Networks
Published 2013-03-01Get full text
Article -
13577
Distilling Big Data: Refining Quality Information in the Era of Yottabytes
Published 2015-01-01“…With reductions in the cost of storage and computational devices and with increasing proliferation of Cloud, we never felt any constraints in storing or processing such data. …”
Get full text
Article -
13578
Model of three-way decision based on the space of set pair information granule and its application
Published 2016-10-01“…Through the analysis of the existing theory and method of three-way decision,model of three-way decision based on the space of set pair information granule was proposed,which was to explain the intension and extension of three-way decision on the view of unity of opposites.Firstly the space structure of set pair information granule can be di-vided into positive granule,negative granule,different granule,which were similar and slightly different with three re-gions of generalized three-way decision.The three kinds of information granules in set pair information granule space were built based on certain positive degree,negative degree and different degree.Secondly,according to the given threshold,set pair information granule is divided into mutually disjointing positive region,negative region and different region.Based on these three regions,the computing method of decision loss function is put forward,and the process of decision-making algorithm is obtained use the three-way decision method of set pair information granule space to evalu-ate and make decision on risk investment,then good decision results have been achieved.…”
Get full text
Article -
13579
TM-Chain: TCB Measurement Management Using Cloud Blockchain for IoT Devices
Published 2025-01-01“…Remote attestation (RA) is a process for checking whether a device’s underlying Trusted Computing Base (TCB) and sensing data from the TCB are trustworthy. …”
Get full text
Article -
13580
Context-Aware Intelligent Traffic Light Control through Secure Messaging
Published 2018-01-01“…The vehicle is modeled as a virtual sensor which reports the traffic state, such as its speed and location, to a traffic light controller through a secure and computationally lightweight protocol. During the reporting process, a vehicle’s identity and location are kept anonymous to any other vehicle in the system. …”
Get full text
Article