Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
13941
VirtualFilter: A High-Performance Multimodal 3D Object Detection Method with Semantic Filtering
Published 2024-12-01Get full text
Article -
13942
-
13943
-
13944
-
13945
Geometric properties of quantum entanglement and machine learning
Published 2023-10-01“…A proprietary quantum computing emulator is used (it is in the public domain).Results. …”
Get full text
Article -
13946
2D Particle Filter Accelerator for Mobile Robot Indoor Localization and Pose Estimation
Published 2024-01-01“…Particle filtering is a reliable Monte Carlo algorithm for estimating the state of a system in modeling non-linear, non-gaussian elements for estimation and tracking applications in various fields, including robotics, navigation, and computer vision. However, particle filtering can be computationally expensive, particularly in high-dimensional state spaces, and can be a bottleneck for real-time applications due to high memory consumption. …”
Get full text
Article -
13947
Calculation of Neural Network Weights and Biases Using Particle Swarm Optimization
Published 2024-01-01“…By using a different approach, bio-inspired computing can be distinguished from other traditional algorithms. …”
Get full text
Article -
13948
Interactive Learning Tool for System of Linear Equations: Bridging the Gap Between Novice and Expert Through MATLAB-Based Solutions
Published 2024-01-01“…The tool allows learners to compare methods based on criteria such as computation time, iteration count, and error margin, using MATLAB solutions as a benchmark for accuracy on systems of any size. …”
Get full text
Article -
13949
Supply Chain Management Using Evolutionary Algorithms
Published 2024-09-01“…The era of digital transformation has made it possible to accumulate large amounts of data that can be used in the decision-making process, in particular in supply chain management. …”
Get full text
Article -
13950
-
13951
Energy Market Manipulation via False-Data Injection Attacks: A Review
Published 2025-01-01Get full text
Article -
13952
Domain-Specific Modeling Language for Security Analysis of EV Charging Infrastructure
Published 2024-11-01“…Indeed, EVs have evolved into sophisticated computer systems with extensive internal and external communication capabilities. …”
Get full text
Article -
13953
BERT-Residual Quantum Language Model Inspired by ODE Multi-Step Method
Published 2025-01-01Get full text
Article -
13954
High-performance reconfigurable encryption scheme for distributed storage
Published 2023-10-01“…As the world embraces the digital economy and enters an information society, data has emerged as a critical production factor.The collection, processing, and storage of data have become increasingly prevalent.Distributed storage systems, known for their efficiency, are widely used in various data fields.However, as the scale of data storage continues to expand, distributed storage faces more significant security risks, such as information leakage and data destruction.These challenges drive the need for innovative advancements in big data distributed storage security technology and foster the integration of domestic cryptographic technology with computing storage technology.This work focused on addressing security issues, particularly information leakage, in distributed storage nodes.A dynamic and reconfigurable encryption storage solution was proposed, which considered the requirements for encryption performance and flexibility.A high-performance reconfigurable cryptographic module was designed based on the bio mapping framework.Based on this module, multiple storage pools equipped with different cryptographic algorithms were constructed to facilitate high-performance encryption and decryption operations on hard disk data.The scheme also enabled dynamic switching of cryptographic algorithms within the storage pools.A cryptographic protocol with remote online loading functions for cryptographic algorithms and keys was developed to meet the unified management and convenient security update requirements of reconfigurable cryptographic modules in various storage nodes.Furthermore, the scheme implemented fine-grained data encryption protection and logical security isolation functions based on cryptographic reconstruction technology.Experimental results demonstrate that the performance loss of this scheme for encryption protection and security isolation of stored data is approximately 10%.It provides a technical approach for distributed storage systems to meet the cryptographic application technology requirements outlined in GB/T 39786-2021 “Information Security Technology-Basic Requirements for Cryptography Applications” Level 3 and above in terms of device and computing security, application and data security.…”
Get full text
Article -
13955
Optimized memory allocation in edge-PLCs using Deep Q-Networks and bidirectional LSTM with Quantum Genetic Algorithm
Published 2024-12-01“…Moreover, we introduce Quantum Genetic Algorithm Optimization, a cutting-edge approach that infuses quantum-inspired principles into the traditional genetic algorithm framework, to further refine the memory allocation process. By leveraging principles of quantum computing, this optimization algorithm explores the solution space more efficiently, allowing for faster convergence and improved performance. …”
Get full text
Article -
13956
Learning stream plot: classroom activity visualization with daily learning log data
Published 2025-04-01Get full text
Article -
13957
How to detect occluded crosswalks in overview images? Comparing three methods in a heavily occluded area
Published 2025-03-01“…While automated methods based on computer vision have been explored to detect crosswalks from aerial images, a major obstacle to their application is the handling of candidate crosswalks occluded by objects or shadows in the aerial imagery. …”
Get full text
Article -
13958
Machine learning-driven prediction of hospital admissions using gradient boosting and GPT-2
Published 2025-03-01Get full text
Article -
13959
Mobile-Commerce Usage Challenges among University Students in Uganda: A Case of Kabale University.
Published 2020“…Mobile commerce (m-commerce) is a new trend in e-commerce that covers a number of services that are conducted online with the help of various computing devices. These services include among others; mobile financial services e.g., mobile banking, mobile payments, mobile brokering etc., mobile shopping services e.g., mobile ticketing and mobile auctioning, and mobile entertainment services e.g., mobile music, mobile gaming, mobile movies, etc. …”
Get full text
Article -
13960