Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
13661
Toward AI-Augmented Formal Verification: A Preliminary Investigation of ENGRU and Its Challenges
Published 2025-01-01“…State-space graphs and automata serve as fundamental tools for modeling and analyzing the behavior of computational systems. Recurrent neural networks (RNNs) and language models are deeply intertwined, as RNNS provide the foundational architecture that enables language models to process sequential data, capture contextual dependencies, and improve natural language processing tasks. …”
Get full text
Article -
13662
Single-atom amplification assisted by multiple sideband interference in waveguide QED systems
Published 2025-01-01Get full text
Article -
13663
A Perception-Driven Transcale Display Scheme for Space Image Sequences
Published 2018-01-01“…The former concentrates on describing the transcle feature of space targets, including three algorithms, attention region computing, frame rate conversion, and image resolution resizing. …”
Get full text
Article -
13664
Generating High Spatial and Temporal Surface Albedo with Multispectral-Wavemix and Temporal-Shift Heatmaps
Published 2025-01-01Get full text
Article -
13665
-
13666
Enforcing interface field continuity to advance finite element approximations in heterogeneous materials
Published 2024-11-01Get full text
Article -
13667
The Effectiveness and Clinical Usability of a Handheld Information Appliance
Published 2012-01-01“…This study was designed to gain a deeper understanding of clinicians’ interactions with a mobile clinical computing appliance (Motion Computing C5) designed to consolidate numerous technological functions into an all-in-one device. …”
Get full text
Article -
13668
IM-Dedup: An Image Management System Based on Deduplication Applied in DWSNs
Published 2013-07-01“…It is suitable for cloud computing platform to apply service in data processing system. …”
Get full text
Article -
13669
Distributed anonymous authentication scheme based on the blockchain in VANET
Published 2022-09-01“…Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet the requirements of efficient authentication, nor can achieve fast and anonymous traceability of malicious vehicles.In view of this, a distributed anonymous authentication scheme based on the blockchain was proposed.The zero-knowledge proof was used to quickly and anonymously authenticate the identity of vehicles in VANET, and the pairing-free-based aggregating signature was used to provide fast batch verification, effectively reducing the computational burden generated during the authentication process.In addition, the regional trusted authority (RTA) could realize the anonymous traceability of malicious vehicle identities, and quickly revoke their identities by using the block chain.It could also update the short-term anonymous identities of vehicles based on local keys in time to ensure that vehicles anonymity and freshness of signatures.Security analysis and simulation show that the proposed scheme can satisfy various security requirements such as anonymity and unlinkability, and can effectively reduce computing and communication overhead, which is at least 27.28% higher in performance than similar schemes.…”
Get full text
Article -
13670
National-Scale Detection of New Forest Roads in Sentinel-2 Time Series
Published 2024-10-01Get full text
Article -
13671
Distributed anonymous authentication scheme based on the blockchain in VANET
Published 2022-09-01“…Identity authentication is the first line of defense against malicious vehicles spreading false traffic information.However, due to the limited network bandwidth and computing power in the vehicle ad-hoc network (VANET), the existing schemes cannot meet the requirements of efficient authentication, nor can achieve fast and anonymous traceability of malicious vehicles.In view of this, a distributed anonymous authentication scheme based on the blockchain was proposed.The zero-knowledge proof was used to quickly and anonymously authenticate the identity of vehicles in VANET, and the pairing-free-based aggregating signature was used to provide fast batch verification, effectively reducing the computational burden generated during the authentication process.In addition, the regional trusted authority (RTA) could realize the anonymous traceability of malicious vehicle identities, and quickly revoke their identities by using the block chain.It could also update the short-term anonymous identities of vehicles based on local keys in time to ensure that vehicles anonymity and freshness of signatures.Security analysis and simulation show that the proposed scheme can satisfy various security requirements such as anonymity and unlinkability, and can effectively reduce computing and communication overhead, which is at least 27.28% higher in performance than similar schemes.…”
Get full text
Article -
13672
A Multimodal Dataset of Cardiac, Electrodermal, and Environmental Signals
Published 2025-05-01Get full text
Article -
13673
A Comprehensive Data Maturity Model for Data Pre-Analysis
Published 2025-04-01Get full text
Article -
13674
Cybersecurity and Liability in a Big Data World
Published 2018-10-01“…After a brief overview of the potentialities and drawbacks deriving from the combination of big data and cloud computing, this article illustrates the challenges and the obligations imposed by the European institutions on providers processing personal data – pursuant to the General Data Protection Regulation – and on providers of digital services and essential services – according to the NIS Directive. …”
Get full text
Article -
13675
Lucas difference sequence spaces defined by Orlicz function in 2-normed spaces
Published 2025-03-01Get full text
Article -
13676
Quantum-mechanical prediction of the behavior of quantum trigger on a two-qubit cell of boron in silicene
Published 2025-06-01“…It was shown that the two-dimensional system B:Si behaves as a quantum switch, allowing operations on the local distribution of charge density and electrostatic potential, thereby processing quantum information. The obtained results will be important for the technology of designing and manufacturing two-dimensional energy-efficient quantum computer.…”
Get full text
Article -
13677
A Novel Scheme with FG-FFT for Analysis of Electromagnetic Scattering from Large Objects
Published 2017-01-01Get full text
Article -
13678
-
13679
Enhancing UAS-Based Multispectral Semantic Segmentation Through Feature Engineering
Published 2025-01-01“…This article investigates how feature engineering (FE), the process of adapting raw data to serve as DL training data, can impact performance when transferring prevalent model architectures to combined red, green, blue (RGB) thermal imagery. …”
Get full text
Article -
13680
Advanced gastrointestinal tract organ differentiation using an integrated swin transformer U-Net model for cancer care
Published 2024-12-01“…This technology holds significant potential for integration into clinical processes, enhancing the precision of radiation therapy for GI cancer patients.…”
Get full text
Article