Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
2941
Selected methods of pathological speech signal analysis
Published 2014-04-01Subjects: Get full text
Article -
2942
MODELING AS A METHOD FOR SCIENTIFIC COGNITION OF COMPLEX MEAT SYSTEMS
Published 2017-10-01Subjects: “…computer modeling…”
Get full text
Article -
2943
Automatic summarization of cooking videos using transfer learning and transformer-based models
Published 2025-01-01Subjects: Get full text
Article -
2944
Comparing AI and human decision-making mechanisms in daily collaborative experiments
Published 2025-06-01Get full text
Article -
2945
TPCM-based trusted PXE boot method for servers
Published 2020-12-01“…The PXE startup mechanism downloads operating system files through the network and starts the operating system,which is widely used in server network startup.It is widely used in server network startup.The PXE boot process is secured and trusted through trusted computing technology to prevent the PXE boot file from being tampered with maliciously,ensuring the safe and reliable operation of the server.The cyber security classified protection standard requires that the system boot program and system program of the server device be trusted and verified based on the trusted root.A TPCM-based server trusted PXE boot method based on the requirements of classified protection standard was proposed to ensure the security and trust of the server's BIOS firmware,PXE bootfiles,and Linux system files.When the server performs PXE boot,TPCM measured BIOS firmware,BIOS boot environment measured PXE boot files,and PXE boot environment measured Linux system files.Taking TPCM as the root of trust,one level of measurement,one level of trust,and a chain of trust were established to achieve a trusted server operating environment.The proposed method was tested on a domestically-controlled,self-controllable Shenwei server.The experimental results show that the proposed method is feasible.…”
Get full text
Article -
2946
Edge Cloud Resource Scheduling with Deep Reinforcement Learning
Published 2025-04-01“…These challenges stem from the need to manage the vast amounts of information transmitted by IoT devices, as well as the necessity of offloading computational tasks to cloud data centers. To tackle this issue, we propose a novel deep reinforcement learning-based resource allocation method called Decima#, which offers an effective resource optimization solution for edge cloud data centers. …”
Get full text
Article -
2947
Emotion classification with multi‐modal physiological signals using multi‐attention‐based neural network
Published 2024-09-01“…Results demonstrated that the proposed network could effectively process four‐modal physiological signals and achieve high accuracy of emotion classification.…”
Get full text
Article -
2948
A Quantum Perceptron: A New Approach for Predicting Rice Prices at the Indonesian Wholesale Trade Level
Published 2024-08-01“…The method focuses on developing models that can leverage quantum computing to process information more effectively than classical methods. …”
Get full text
Article -
2949
Real-time analysis of Delphi panel data to facilitate iterative rating within meetings
Published 2025-07-01Get full text
Article -
2950
Exploring Smartphone-Based Edge AI Inferences Using Real Testbeds
Published 2025-05-01“…To empirically answer this, we use three pre-trained DL models and eight heterogeneous edge nodes including five low/mid-end smartphones and three SBCs, and compare the performance achieved using workloads from three image stream processing scenarios. Experiments were run with the help of a toolset designed for reproducing battery-driven edge computing tests. …”
Get full text
Article -
2951
-
2952
Worst-Case Input Generation for Concurrent Programs under Non-Monotone Resource Metrics
Published 2024-12-01Get full text
Article -
2953
Feature-Frequency–Adaptive On-line Training for Fast and Accurate Natural Language Processing
Published 2021-03-01Get full text
Article -
2954
An Improved Ant Colony Optimization Approach for Optimization of Process Planning
Published 2014-01-01“…Computer-aided process planning (CAPP) is an important interface between computer-aided design (CAD) and computer-aided manufacturing (CAM) in computer-integrated manufacturing environments (CIMs). …”
Get full text
Article -
2955
Calculation of coal cleats spacing for methane degassing by image processing
Published 2025-01-01“…Computer-based image processing technology was conducted to determine the coal cleats. …”
Get full text
Article -
2956
Overview of control-flow hijacking attack and defense techniques for process
Published 2019-12-01“…Control flow hijacking attack is a common attack against computer software,which brings great harm to computer software security and is a research hotspot in the field of information security.Firstly,from the perspective of the source of attack code,the related research was expounded on process’s control flow hijacking attack.Secondly,according to the newest development status of control flow hijacking attack technology,the related defense technologies at home and abroad were introduced based on different defense ideas.Finally,the development trend of control flow hijacking offensive and defensive technology were summarized.…”
Get full text
Article -
2957
Estimation of the Conditional Probability Using a Stochastic Gradient Process
Published 2021-01-01“…Nevertheless, such a large volume of data is often accompanied by a significant need for computational capacity as well as a consequent compilation time. …”
Get full text
Article -
2958
Leveraging Machine Learning for Process Monitoring in Environmental Impact Tracking
Published 2024-05-01Get full text
Article -
2959
A Formal Model of the Exploitation Process for Railway Signalling Devices
Published 2024-12-01Get full text
Article -
2960
Multi-wavelength optical information processing with deep reinforcement learning
Published 2025-04-01“…In systems based on dispersion compensating fiber, micro-ring resonator array, and Mach-Zehnder interferometer array that use multi-wavelength optical carriers as the light source, the DRC method enables the completion of the corresponding signal processing functions within 21 iterations. This method provides efficient and accurate control, making it suitable for applications such as optical convolution computation acceleration, microwave photonic signal processing, and optical network routing.…”
Get full text
Article