Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
1101
RETRACTED: Assisting Smart Construction With Reliable Edge Computing Technology
Published 2022-05-01“…Cloud computing technologies are now being used to solve processing and analytical challenges. …”
Get full text
Article -
1102
-
1103
Increasing the Reusability of IoT-aware Business Processes
Published 2020-09-01Get full text
Article -
1104
Application Possibilities of Computer Software in the Context of the Art Teaching
Published 2020-07-01“…The results of the research are significant for the processes of designing initial university education programs, as well as in programs for lifelong professional teacher training, both for the purpose of educating teachers about the possibilities of using computer software and their impact on enhancing students' creativity. …”
Get full text
Article -
1105
Load balancing for high performance computing using quantum annealing
Published 2025-01-01“…Load balancing is the distribution of computational work between available processors. Here, we investigate the application of quantum annealing to load balance two paradigmatic algorithms in high-performance computing. …”
Get full text
Article -
1106
Computational study of terahertz-driven controllable molecular isomerization
Published 2025-08-01Get full text
Article -
1107
SOFTWARE FOR COMPUTER-AIDED DESIGN OF CROSS-WEDGE ROLLING
Published 2016-10-01“…The issues of computer technology creation of 3D-design and engineering analysis of metal forming processes using cross wedge rolling methods (CWR) are considered. …”
Get full text
Article -
1108
Computational study into the experimental capabilities of the MTRR SCW reactor
Published 2025-06-01Get full text
Article -
1109
Computer says ‘no’: On the materiality of software in organising tech work
Published 2025-02-01Get full text
Article -
1110
Research on Internet of Things security architecture based on fog computing
Published 2019-11-01“…Fog computing is the infrastructure that can use processing power anywhere in the cloud. …”
Get full text
Article -
1111
Application of Image Computing in Non-Destructive Detection of Chinese Cuisine
Published 2025-07-01Get full text
Article -
1112
-
1113
Optimizing healthcare big data performance through regional computing
Published 2025-01-01“…To mitigate these issues, this paper proposes a Regional Computing (RC) paradigm for the management of HBD. …”
Get full text
Article -
1114
A Spread Willingness Computing-Based Information Dissemination Model
Published 2014-01-01Get full text
Article -
1115
Edge Computing-Enabled Train Fusion Positioning: Modeling and Analysis
Published 2025-03-01“…An innovative approach, which combines multi-sensor information fusion with edge computing, is proposed to reduce the computational load on onboard systems and accelerate data processing. …”
Get full text
Article -
1116
Key metrics for monitoring performance variability in edge computing applications
Published 2025-05-01“…Edge computing systems typically consist of heterogeneous processing and networking components, resulting in inconsistent task performance. …”
Get full text
Article -
1117
Design and Application of On-board Computing and Display Control Unit for Mine
Published 2023-02-01“…This paper studies the core components of the collaborative work management system, and puts forward a design method of the on-board computing display control unit that integrates the on-board computing control function and human-computer interaction processing function. …”
Get full text
Article -
1118
Research and application of mining AI video edge computing technology
Published 2024-12-01“…This enabled real-time and on-site analysis and processing of underground video data, effectively reducing the data transmission delay and improving the response rate and processing efficiency of video analysis.…”
Get full text
Article -
1119
Memristor-Based Artificial Neural Networks for Hardware Neuromorphic Computing
Published 2025-01-01“…Artificial neural networks have long been studied to emulate the cognitive capabilities of the human brain for artificial intelligence (AI) computing. However, as computational demands intensify, conventional hardware based on transistor and complementary metal oxide semiconductor (CMOS) technology faces substantial limitations due to the separation of memory and processing, a challenge commonly known as the von Neumann bottleneck. …”
Get full text
Article -
1120
Exploration and practice of data quality governance in privacy computing scenarios
Published 2022-09-01“…Privacy computing is a new data processing technology, which can realize the transformation and circulation of a data value on the premise of protecting data privacy and security.However, the invisible feature of data in private computing scenarios poses a great challenge to traditional data quality management.There is still a lack of perfect solutions.To solve the above problems in the industry, a data quality governance method and process suitable for privacy computing scenarios were proposed.A local and multi-party data quality evaluation system was constructed, which could take into account the data quality governance of the local domain and the federal domain.At the same time, a data contribution measurement method was proposed to explore the long-term incentive mechanism of privacy computing, improve the data quality of privacy computing, and improve the accuracy of computing results.…”
Get full text
Article