Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
14261
A Self‐Organizing Map Spiking Neural Network Based on Tin Oxide Memristive Synapses and Neurons
Published 2025-02-01“…Abstract Neuromorphic computing systems are promising alternatives in areas such as pattern recognition and image processing. …”
Get full text
Article -
14262
Designing Development Readiness Indicators and Roadmap for Petaflops Scale Supercomputers
Published 2022-07-01“…In this regard, a comprehensive roadmap is necessary to design and achieve high-performance computing services. This paper proposes a comprehensive roadmap focusing on several strategic areas, including research activities, infrastructure and platforms, data processing, standard regulations, applied services, and business development. …”
Get full text
Article -
14263
Exponential optimization of adiabatic quantum-state preparation
Published 2025-03-01“…The preparation of a given quantum state on a quantum computing register is a typically demanding operation, requiring a number of elementary gates that scales exponentially with the size of the problem. …”
Get full text
Article -
14264
AIoT-Enabled Data Management for Smart Agriculture: A Comprehensive Review on Emerging Technologies
Published 2025-01-01“…., perception layer, transport layer, data platform layer, and application layer) correspond to agricultural information sensing, data transmission, storage processing, and intelligent decision-making, respectively. …”
Get full text
Article -
14265
A swin transformer and CNN fusion framework for accurate Parkinson disease classification in MRI
Published 2025-04-01Get full text
Article -
14266
AERQ—A Web-Based Decision Support Tool for Air Quality Assessment
Published 2025-02-01“…The decision support system (DSS), AERQ, incorporates the AERMOD modeling tool, achieving a 10 m spatial and 1 h temporal resolution for air quality predictions. It processes hourly climate and traffic data via a high-performance computing (HPC) platform, significantly enhancing prediction accuracy and decision-making efficiency. …”
Get full text
Article -
14267
Breaking barriers: broadening neuroscience education via cloud platforms and course-based undergraduate research
Published 2025-07-01“…Over four consecutive spring semesters (2021–2024), a total of 42 undergraduate students at Lawrence Technological University participated in computational neuroscience CUREs using brainlife.io, a cloud-computing platform. …”
Get full text
Article -
14268
Discount-Based Cloud Resource Management Using Cloud Broker
Published 2023-12-01“…Moreover, IT organizations might profit from developing a structure of warnings to further develop perceivability and control over asset utilization. Cloud computing is a model used to enable omnipresent, helpful, on-request network admittance to a common pool of configurable processing assets that can be quickly provisioned and delivered with negligible administrative exertion and without specialist organizations. …”
Get full text
Article -
14269
A Quantum Q-Learning Fault Diagnosis Method for Intelligent Manufacturing Equipment
Published 2025-07-01“…The distinct advantages of quantum computing are innovatively integrated with the decision-making framework of Q-learning through this method. …”
Get full text
Article -
14270
Modified LSTM based skin lesion segmentation and classification using optimization concept
Published 2025-08-01Get full text
Article -
14271
Enhancing cross-subject emotion recognition precision through unimodal EEG: a novel emotion preceptor model
Published 2024-12-01“…Abstract Affective computing is a key research area in computer science, neuroscience, and psychology, aimed at enabling computers to recognize, understand, and respond to human emotional states. …”
Get full text
Article -
14272
Investigating the data science talent gap: Data practitioners’ perspectives
Published 2025-04-01Get full text
Article -
14273
EMVAS: end-to-end multimodal emotion visualization analysis system
Published 2025-07-01Get full text
Article -
14274
Enhancing Neural Network Interpretability Through Deep Prior-Guided Expected Gradients
Published 2025-06-01Get full text
Article -
14275
2D Particle Filter Accelerator for Mobile Robot Indoor Localization and Pose Estimation
Published 2024-01-01“…Particle filtering is a reliable Monte Carlo algorithm for estimating the state of a system in modeling non-linear, non-gaussian elements for estimation and tracking applications in various fields, including robotics, navigation, and computer vision. However, particle filtering can be computationally expensive, particularly in high-dimensional state spaces, and can be a bottleneck for real-time applications due to high memory consumption. …”
Get full text
Article -
14276
-
14277
-
14278
Towards a quantum decision tree in a laser pumped four-level system
Published 2025-01-01“…This methodology is scalable to systems of N levels, offering potential applications in quantum computing and decision-making processes.…”
Get full text
Article -
14279
Energy Market Manipulation via False-Data Injection Attacks: A Review
Published 2025-01-01Get full text
Article -
14280
High-performance reconfigurable encryption scheme for distributed storage
Published 2023-10-01“…As the world embraces the digital economy and enters an information society, data has emerged as a critical production factor.The collection, processing, and storage of data have become increasingly prevalent.Distributed storage systems, known for their efficiency, are widely used in various data fields.However, as the scale of data storage continues to expand, distributed storage faces more significant security risks, such as information leakage and data destruction.These challenges drive the need for innovative advancements in big data distributed storage security technology and foster the integration of domestic cryptographic technology with computing storage technology.This work focused on addressing security issues, particularly information leakage, in distributed storage nodes.A dynamic and reconfigurable encryption storage solution was proposed, which considered the requirements for encryption performance and flexibility.A high-performance reconfigurable cryptographic module was designed based on the bio mapping framework.Based on this module, multiple storage pools equipped with different cryptographic algorithms were constructed to facilitate high-performance encryption and decryption operations on hard disk data.The scheme also enabled dynamic switching of cryptographic algorithms within the storage pools.A cryptographic protocol with remote online loading functions for cryptographic algorithms and keys was developed to meet the unified management and convenient security update requirements of reconfigurable cryptographic modules in various storage nodes.Furthermore, the scheme implemented fine-grained data encryption protection and logical security isolation functions based on cryptographic reconstruction technology.Experimental results demonstrate that the performance loss of this scheme for encryption protection and security isolation of stored data is approximately 10%.It provides a technical approach for distributed storage systems to meet the cryptographic application technology requirements outlined in GB/T 39786-2021 “Information Security Technology-Basic Requirements for Cryptography Applications” Level 3 and above in terms of device and computing security, application and data security.…”
Get full text
Article