Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
14081
-
14082
A comprehensive IoT cloud-based wind station ready for real-time measurements and artificial intelligence integration
Published 2024-12-01“…Using this method, all station data are processed every 3 seconds and stored ready for Artificial Intelligence usage with an approximate latency of 150–300 milliseconds, representing up to an 85% reduction in processing delay compared to similar solutions with over 1-second latencies. …”
Get full text
Article -
14083
Lifespan brain age prediction based on multiple EEG oscillatory features and sparse group lasso
Published 2025-07-01Get full text
Article -
14084
A New Method for Defuzzification and Ranking of Fuzzy Numbers Based on the Statistical Beta Distribution
Published 2016-01-01“…Granular computing is an emerging computing theory and paradigm that deals with the processing of information granules, which are defined as a number of information entities grouped together due to their similarity, physical adjacency, or indistinguishability. …”
Get full text
Article -
14085
Research on Hybrid Architecture Neural Networks for Time Series Prediction
Published 2025-01-01Get full text
Article -
14086
Leveraging Gradient Noise for Detection and Filtering of Byzantine Clients
Published 2025-01-01Get full text
Article -
14087
Quantum resonant dimensionality reduction
Published 2025-01-01“…Quantum computing is a promising candidate for accelerating machine learning tasks. …”
Get full text
Article -
14088
Cyber‐physical system model based on multi‐agent system
Published 2024-12-01“…Abstract Integrating physical processes with computational components creates cyber‐physical systems (CPS) that seamlessly interact between the physical and digital worlds. …”
Get full text
Article -
14089
Coverage problem in camera-based sensor networks using the CUDA platform
Published 2017-12-01“…In addition, a parallel experiment using general-purpose computing on graphics processing units is added to improve computing speed, which is a disadvantage in genetic algorithms. …”
Get full text
Article -
14090
Real-Time Data-Driven Method for Bolt Defect Detection and Size Measurement in Industrial Production
Published 2025-04-01“…A high-precision camera calibration method was used, and image processing was accelerated through GPU parallel computing to ensure efficient and real-time target size measurement. …”
Get full text
Article -
14091
Comparison between Statistical Approaches and Data Mining Algorithms for Outlier Detection
Published 2024-05-01“…Suggestions for further research are to improve the data mining method by focusing more on statistical analysis apart from focusing on data processing computing time so that the expected results of outlier detection are faster and more precise.…”
Get full text
Article -
14092
A Fast Hybrid Classification Algorithm with Feature Reduction for Medical Images
Published 2022-01-01“…QGH integrates quantum computing into machine learning and intelligence applications. …”
Get full text
Article -
14093
Low Insertion Loss and Non-Blocking Microring-Based Optical Router for 3D Optical Network-on-Chip
Published 2018-01-01“…With the advent of complex computing applications such as cloud computing and artificial intelligence, the utilization of multicore processors has become one of the best solutions to improve the computation performance. …”
Get full text
Article -
14094
-
14095
A recurrent YOLOv8-based framework for event-based object detection
Published 2025-01-01Get full text
Article -
14096
Nitrous oxide (N<sub>2</sub>O) in Macquarie Harbour, Tasmania
Published 2024-12-01Get full text
Article -
14097
Security decision method for the edge of multi-layer satellite network based on reinforcement learning
Published 2022-06-01“…The geosynchronous orbit satellite has the largest coverage and the strongest computing processing capability. This paper uses deep reinforcement learning algorithms to implement edge security decisions for satellite networks. …”
Get full text
Article -
14098
CRYPTO-RESISTANT METHODS AND RANDOM NUMBER GENERATORS IN INTERNET OF THINGS (IOT) DEVICES
Published 2022-06-01“…The analysis of technologies and circuit solutions allowed to draw the following conclusions: protection of IoT solutions includes: security of IoT network nodes and their connection to the cloud using secure protocols, ensuring confidentiality, authenticity and integrity of IoT data by cryptographic methods, attack analysis and network cryptographic stability; the initial basis for the protection of IoT solutions is the true randomness of the formed RNG sequences and used in algorithms for cryptographic transformation of information to protect it; feature of IoT devices is their heterogeneity and geographical distribution, limited computing resources and power supply, small size; The most effective (reduce power consumption and increase the generation rate) for use in IoT devices are RNG exclusively on a digital basis, which implements a three-stage process: the initial digital circuit, normalizer and random number flow generator; Autonomous Boolean networks (ABN) allow to create RNG with unique characteristics: the received numbers are really random, high speed – the number can be received in one measure, the minimum power consumption, miniature, high (up to 3 GHz) throughput of Boolean chaos; a promising area of ABN development is the use of optical logic valves for the construction of optical ABN with a bandwidth of up to 14 GHz; the classification of known classes of RNG attacks includes: direct cryptanalytic attacks, attacks based on input data, attacks based on the disclosure of the internal state of RNG, correlation attacks and special attacks; statistical test packages to evaluate RNG sequences have some limitations or shortcomings and do not replace cryptanalysis; Comparison of cryptoaccelerators with cryptographic transformation software shows their significant advantages: for AES block encryption algorithm, speeds increase by 10-20 times in 8/16-bit cryptoaccelerators and 150 times in 32-bit, growth hashing of SHA-256 in 32-bit cryptoaccelerators more than 100 times, and for the NMAS algorithm - up to 500 times. …”
Get full text
Article -
14099
Object-based feedback attention in convolutional neural networks improves tumour detection in digital pathology
Published 2024-12-01“…Abstract Human visual attention allows prior knowledge or expectations to influence visual processing, allocating limited computational resources to only that part of the image that are likely to behaviourally important. …”
Get full text
Article -
14100
Image Segmentation Method With Improved GA Optimization of Two-Dimensional Maximum Entropy
Published 2024-01-01“…Image segmentation is the cornerstone that determines the effectiveness of image processing, but traditional image segmentation methods have issues such as long computation time, low recognition accuracy, and poor anti-interference ability. …”
Get full text
Article