Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
13861
Implementation of an Intelligent Trap for Effective Monitoring and Control of the <i>Aedes aegypti</i> Mosquito
Published 2024-10-01“…The application of machine learning (ML) algorithms and computer vision for the identification and classification of <i>Aedes aegypti</i> is a crucial part of this process. …”
Get full text
Article -
13862
LCDDN-YOLO: Lightweight Cotton Disease Detection in Natural Environment, Based on Improved YOLOv8
Published 2025-02-01“…In summary, the LCDDN-YOLO model offers excellent detection accuracy and speed, making it effective for pest and disease control in cotton fields, particularly in lightweight computing scenarios.…”
Get full text
Article -
13863
Wavelet-Enhanced Desnowing: A Novel Single Image Restoration Approach for Traffic Surveillance Under Adverse Weather Conditions
Published 2025-01-01“…Image restoration under adverse weather conditions refers to the process of removing degradation caused by weather particles while improving visual quality. …”
Get full text
Article -
13864
-
13865
Analysis of deep learning-based technological innovation governance on the intelligent allocation of innovation resources in the high-technology industry
Published 2025-08-01“…The development of DL provides new opportunities to address the challenges of innovation resource allocation in the high-tech industry, as it can process massive datasets and uncover intricate relationships. …”
Get full text
Article -
13866
Research on Reservoir History Matching Method Based on Real⁃Coded Genetic Algorithm and Connectivity Model
Published 2025-06-01“…As gradient⁃based methods face challenges in computing the gradient of the objective function, intelligent optimization algorithms with stochastic properties are widely applied in reservoir optimization processes. …”
Get full text
Article -
13867
-
13868
-
13869
Unified regularity measures for sample-wise learning and generalization
Published 2024-12-01“…Abstract Fundamental machine learning theory shows that different samples contribute unequally to both the learning and testing processes. Recent studies on deep neural networks (DNNs) suggest that such sample differences are rooted in the distribution of intrinsic pattern information, namely sample regularity. …”
Get full text
Article -
13870
A lightweight and style-robust neural network for autonomous driving in end side devices
Published 2023-12-01“…Due to the limitation of the computing power of end side devices, the autonomous driving algorithm should adopt a lightweight model and have high performance. …”
Get full text
Article -
13871
Two-party cooperative blind signature based on SM2
Published 2022-12-01“…SM2, issued by China in 2010, is a public key cryptography standard based on elliptic curves.It has been widely used in finance, social security and other fields thanks to its advantages of improved signature efficiency, decreased storage space and computing complexity than RSA.With the popularization and application of SM2, the issues of its key security and data privacy are of great concern.The single-key mode inhibits the potential application in multi-user settings, and the leakage of the key will threaten the security of the entire cryptosystem due to the centralization.The problem of secure storage and reasonable utilization of keys needs to be solved urgently.In addition, the SM2 digital signature algorithm cannot guarantee the message privacy.Aiming at the issues of key security and data privacy of the signature algorithm, many researchers have proposed the idea of cooperative signature and blind signature for SM2.However, there isn’t SM2 collaborative blind signature scheme proposed.Then a two-party cooperative blind signing protocol based on SM2 was proposed in this paper, which allowed two parties to sign except the user.The signing process did not require recovering the complete private key, while not revealing the information of the partial private key and secret number.The key was stored separately to improve the security of the key, while the blind signature protected the privacy of the message.In terms of security, the protocol satisfied unforgeability and unlinkability.The protocol was implemented using C to demonstrate the efficiency of each participant’s local operation.In the honest model, the time cost of each entity in the cooperative signature phase was similar as that of executing a lightweight SM2 blind signature.Overall, the proposed protocol has certain advantages in terms of function and efficiency.…”
Get full text
Article -
13872
General Inverse Problem Solution for Two-Level Systems and Its Application to Charge Transfer
Published 2024-09-01“…Our formulation is proposed as a basic step towards potential uses of charge transfer in quantum computing and quantum information transfer.…”
Get full text
Article -
13873
Beyond the hype: longitudinal trends in virtual reality perceptions beyond the COVID-19 pandemic
Published 2025-03-01“…The metaverse is shaped significantly by spatial computing technologies, such as virtual reality (VR). …”
Get full text
Article -
13874
Phylogenomic approaches reveal a robust time-scale phylogeny of the Terminal Fusarium Clade
Published 2024-06-01Get full text
Article -
13875
ALGORITHMIC AND PROGRAM IMPLEMENTATION OF THE PLAGIARISM DEFINITION IN LEARNING MANAGEMENT SYSTEMS
Published 2018-06-01“…The proposed modification will also speed up the calculation process, since there is no need to search for common terms for all documents. …”
Get full text
Article -
13876
-
13877
Efficient and Lightweight IoT Security Using CNTFET-Based Ultra-Low Power SRAM-PUF
Published 2025-03-01“…Further post-processing procedures are executed using MATLAB software.…”
Get full text
Article -
13878
A fuzzy recurrent neural network for driver fatigue detection based on steering-wheel angle sensor data
Published 2019-09-01Get full text
Article -
13879
-
13880
Blockchain: An opportunity to improve supply chains in the wake of digitalization
Published 2024-11-01Get full text
Article