Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
1561
-
1562
Quantum Computing-Accelerated Kalman Filtering for Satellite Clusters: Algorithms and Comparative Analysis
Published 2025-01-01“…These findings highlight the potential of quantum computing to optimize data processing strategies for future missions, including deep space explorations.…”
Get full text
Article -
1563
LOGISTICAL PROCESSES IN MILITARY AVIATION ORGANIZATIONS
Published 2017-03-01“…This article examines airbases as organizational units of the Polish Air Force from the perspective of executing logistical processes, with a particular emphasis on multirole aircraft maintenance processes. …”
Get full text
Article -
1564
Automated control system for casting process
Published 2023-11-01“…To analyze the relationship between the defining parameters of the cupola process using advanced experience in operating cupola, the latest achievements in the field of mathematical modeling of technical systems and modern computer technology, considering the process as a cybernetic system.The structure of the management system is developed in accordance with the main trends in automation identified during the analytical review. …”
Get full text
Article -
1565
Multiscale information processing in the immune system
Published 2025-07-01“…The immune system is an advanced, multiscale adaptive network capable of processing biological information across molecular, cellular, tissue, and systemic levels, demonstrating remarkable properties such as antifragility and criticality. …”
Get full text
Article -
1566
Ultrafast silicon photonic reservoir computing engine delivering over 200 TOPS
Published 2024-12-01“…Abstract Reservoir computing (RC) is a powerful machine learning algorithm for information processing. …”
Get full text
Article -
1567
Lightweight error-tolerant edge detection using memristor-enabled stochastic computing
Published 2025-05-01“…Abstract The demand for efficient edge computer vision has spurred the development of stochastic computing for image processing. …”
Get full text
Article -
1568
-
1569
Capture and Process Differences Between Ontologies
Published 2025-01-01“…Based on changes have been made to the ontology, the OnDeT tool captures and processes differences between different versions of the same ontology. …”
Get full text
Article -
1570
A novel routing method for dynamic control in distributed computing power networks
Published 2024-12-01“…Tasked with both packet transmission and data processing, it requires joint optimization of communications and computing. …”
Get full text
Article -
1571
ACC-PH: a Comprehensive Framework for Adopting Cloud Computing in Private Hospitals
Published 2023-10-01Get full text
Article -
1572
Authentication and Encryption algorithms for data security in Cloud computing: A comprehensive review
Published 2022-01-01Get full text
Article -
1573
Fog Computing Architecture for Load Balancing in Parallel Production with a Distributed MES
Published 2025-07-01“…This article presents a practical solution for companies seeking to evolve their production processes during the expansion phase of their manufacturing, starting from a base architecture with Industry 4.0 features which then integrate and implement specific tools that facilitate the duplication of installed capacity; this creates a situation that allows for the development of manufacturing execution systems (MESs) for each production line and a fog computing node, which is responsible for optimizing the load balance of order requests coming from the cloud and also acts as an intermediary between MESs and the cloud. …”
Get full text
Article -
1574
Artificial Intelligence for Unstructured Data Processing
Published 2025-03-01“…Artificial Intelligence (AI) has become an innovative solution in addressing this challenge through techniques such as Natural Language Processing (NLP), Computer Vision, and Machine Learning. …”
Get full text
Article -
1575
Theoretical aspects of the digitalization of production processes
Published 2023-11-01“…The authors substantiate that digitalization of production is the consolidation of all business processes at the enterprise using computer and information technologies. …”
Get full text
Article -
1576
A Dual‐Modal Memory Organic Electrochemical Transistor Implementation for Reservoir Computing
Published 2025-01-01“…Neuromorphic computing devices offer promising solutions for next‐generation computing hardware, addressing the high throughput data processing demands of artificial intelligence applications through brain‐mimicking non‐von Neumann architecture. …”
Get full text
Article -
1577
-
1578
System Design for Media Server Based on Cloud Computing Technology and the Application Analysis
Published 2013-06-01Get full text
Article -
1579
Stock volatility as an anomalous diffusion process
Published 2024-12-01“…Our architecture combines convolutional and recurrent neural networks (bidirectional long short-term memory units). Our model computes the diffusion exponent of a financial time series to measure its volatility and it categorizes market movements into five diffusion models: annealed transit time motion (ATTM), continuous time random walk (CTRW), fractional Brownian motion (FBM), Lévy walk (LW), and scaled Brownian motion (SBM).Our findings suggest that the diffusion exponent derived from anomalous diffusion processes provides insightful and novel perspectives on stock market volatility. …”
Get full text
Article -
1580
Research on distributed multi-access edge computing based on mimic defense theory
Published 2019-09-01“…The highly efficient network resources are provided by multi-access edge computing at the edge of the network,but high security capability is required also due to its distributed position and organization.Based on mimic defense theory,mimic defense structure for distributed multi-access edge computing was proposed.By segmenting data,padding check data and processing data at multiple edge node,dynamic scheduling and decision-making functions according to checksum were implemented.The simulation results show that with the increase of delay cost,the data manipulation and leak rates can be reduced effectively by the proposed structure.The edge node scheduling strategy based on trust and cost is proposed to improve the efficiency and security of the system.…”
Get full text
Article