Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
13941
MARSweb: a fully automated web service for set-based association testing
Published 2025-02-01“…Unfortunately, due to its complex running process, time complexity, and the requirement of high-performance computing resources, it is not widely used. …”
Get full text
Article -
13942
Prediction of alkali-silica reaction expansion of concrete using explainable machine learning methods
Published 2025-04-01“…However, these methods are time-consuming and computationally costly, which makes ASR prediction challenging. …”
Get full text
Article -
13943
Enhanced Cloud Detection Using a Unified Multimodal Data Fusion Approach in Remote Images
Published 2025-04-01“…Aiming at the complexity of network architecture design and the low computational efficiency caused by variations in the number of modalities in multimodal cloud detection tasks, this paper proposes an efficient and unified multimodal cloud detection model, M2Cloud, which can process any number of modal data. …”
Get full text
Article -
13944
Real-Time Interference Mitigation for Reliable Target Detection with FMCW Radar in Interference Environments
Published 2024-12-01“…DL-based approaches typically have high computational costs, which makes them unsuitable for real-time applications with strict latency requirements and limited computing resources. …”
Get full text
Article -
13945
THE LEGAL STATUS OF THE SHARES TRADED ON RASDAQ MARKET
Published 2015-07-01“…The role designated for RASDAQ was as platform for valuing papers issued in the privatization program in Romania (mass privatization process - MPP). In fact the participating companies to MPP had the legal obligation, under first Romanian Capital Market Law, No 52/1194, to be listed on a stock exchange. …”
Get full text
Article -
13946
Dynamic and efficient vehicular cloud management scheme with privacy protection
Published 2022-12-01“…The vehicular cloud (VC) formed by vehicles is used for localization processing and consumption of traffic sensing data to achieve timely intelligent traffic management.The vehicle cloud is highly dynamic, self-organizing and timely, in which the identity and location privacy of vehicle users need to be protected as this poses challenges to the vehicular cloud management.A dynamic and self-organizing vehicle cloud management scheme based on the asymmetric group key agreement protocol was designed, where the vehicle cloud is automatically formed through the self-organized group key agreement of vehicles.The group key was used to control the provision and access of vehicle cloud services, and the dynamic management of the vehicle cloud was implemented through group key update.The scheme used traceable one-time pseudonym technology to achieve anonymous authentication and conditional privacy protection of vehicle users, and the group key agreement stage only included one bilinear pair operation to achieve high efficiency.In addition, the key negotiation and update process used lightweight signatures, supporting batch verification, to achieve efficient message source authentication and integrity authentication.Then the security and efficiency of vehicle cloud communications in the self-organizing environment can be ensured.The dynamic key update mechanism of the key agreement protocol realized the dynamic joining or exiting of vehicles in the vehicle cloud, adapting to the dynamic characteristics of the vehicle cloud.Under the random oracle model and the difficult assumption of the inverse computational Diffie Hellman (ICDH) problem, it was proved that the asymmetric group key agreement scheme satisfied the selective-plaintext security.The security analysis shows that the scheme can protect the identity and location privacy of vehicle users, realize the legal tracking of malicious vehicles, and ensure the confidentiality, integrity and anti-counterfeiting of communications, as well as the forward security of vehicle cloud dynamic management.The performance comparison analysis shows that this scheme has certain advantages in communication and computing efficiency under the condition of the same function and security level.…”
Get full text
Article -
13947
Enhancing Autism Detection Through Gaze Analysis Using Eye Tracking Sensors and Data Attribution with Distillation in Deep Neural Networks
Published 2024-12-01“…This refinement process significantly improves both accuracy and computational efficiency, achieving a test accuracy of 94.35% while using only 77% of the dataset, showing that the proposed GBAC outperforms the same model trained on the full dataset and random sample reductions, as well as the benchmarks. …”
Get full text
Article -
13948
Developing stock sentiment rank metric for forecasting stock sentiments: a statistical perspective
Published 2025-07-01Get full text
Article -
13949
A Hybrid Transfer Learning Approach to Teeth Diagnosis Using Orthopantomogram Radiographs
Published 2024-01-01“…The rise in the emphasis on oral diseases has elevated the need to automate the diagnostic process of such diseases. Fortunately, the availability of modern computing devices has made the automated diagnosis of teeth readily possible using deep learning. …”
Get full text
Article -
13950
-
13951
A Quality-Centered Analysis of Eye Tracking Data in Foveated Rendering
Published 2017-09-01Get full text
Article -
13952
Framework for the Multi-Objective Optimization of Hybrid Fuel Cell System Design and Operation
Published 2024-01-01“…The added value of the generic process is demonstrated by a MOO of an automotive FCS power train with fuel consumption and fuel cell aging as conflicting targets. …”
Get full text
Article -
13953
SMFF-DTA: using a sequential multi-feature fusion method with multiple attention mechanisms to predict drug-target binding affinity
Published 2025-05-01“…Abstract Background Drug-target binding affinity (DTA) prediction can accelerate the drug screening process, and deep learning techniques have been used in all facets of drug research. …”
Get full text
Article -
13954
A Review of the Industry 4.0 to 5.0 Transition: Exploring the Intersection, Challenges, and Opportunities of Technology and Human–Machine Collaboration
Published 2025-03-01“…The Industrial Revolution (IR) involves a centuries-long process of economic and societal transformation driven by industrial and technological innovation. …”
Get full text
Article -
13955
Wind Turbine Blade Defect Recognition Method Based on Large-Vision-Model Transfer Learning
Published 2025-07-01Get full text
Article -
13956
TFTformer: A novel transformer based model for short-term load forecasting
Published 2025-05-01Get full text
Article -
13957
Unmanned Ground Vehicles for Continuous Crop Monitoring in Agriculture: Assessing the Readiness of Current ICT Technology
Published 2024-10-01“…The focus is on shifting from traditional cloud-based approaches, where data are sent to remote computers for deferred processing, to a hybrid design emphasizing edge computing for real-time analysis in the field. …”
Get full text
Article -
13958
High-throughput screening of multimetallic catalysts for three-way catalysis
Published 2024-12-01Get full text
Article -
13959
Machine learning-based prediction of CO2 solubility in methyldiethanolamine solutions: A comparative study
Published 2025-06-01“…In order to construct robust models, three heuristic soft computing methods, including radial basis function neural network (RBF-NN), gaussian process regression (GPR) and multilayer perceptron neural network (MLP-NN) were employed. …”
Get full text
Article -
13960
Blockchain Enabled Federated Learning for Detection of Malicious Internet of Things Nodes
Published 2024-01-01Get full text
Article