Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- Information technology 9
- Moral and ethical aspects 9
- Management 8
- computer 8
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- History 4
- Human-computer interaction 4
- Language and languages 4
- Mass media 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- Hospitality industry 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- MATHEMATICS / Mathematical Analysis 3
- Mathematical analysis 3
-
54181
Comparative analysis and manufacturing of airfoil structures suitable for use at low speeds
Published 2022-12-01“…With the selected wing profile, the geometry is shaped in two dimensions and designed in three dimensions. Computational fluid dynamics (CFD) was adopted as the method for studying wing profiles. …”
Get full text
Article -
54182
The proclivity of free-ranging indigenous village chickens for night-time roosting in trees
Published 2021-05-01Get full text
Article -
54183
A Synchronous-Asynchronous Particle Swarm Optimisation Algorithm
Published 2014-01-01Get full text
Article -
54184
Application of the Improved Multipopulation Genetic Algorithm in the TMD Controlled System considering Soil-Structure Interaction
Published 2022-01-01“…With the advent of globalization, computing speed has increased tremendously, greatly advancing algorithm research in multiple fields. …”
Get full text
Article -
54185
Quantum-limited stochastic optical neural networks operating at a few quanta per activation
Published 2025-01-01“…Abstract Energy efficiency in computation is ultimately limited by noise, with quantum limits setting the fundamental noise floor. …”
Get full text
Article -
54186
Prescribed-time trajectory tracking control for a class of nonlinear system
Published 2024-12-01Get full text
Article -
54187
Intelligent Modeling; Single (Multi-layer perceptron) and Hybrid (Neuro-Fuzzy Network) Method in Forest Degradation (Case Study: Sari County)
Published 2021-03-01“…The classical methods, also known as hard methods, are based on the accuracy of calculations, while the real world is founded on the inaccuracy of boundaries and the uncertainties, which is more consistent with soft computing methods. Each of these methods has its own strengths and weaknesses, and the hybridization theory was introduced to solve these problems. …”
Get full text
Article -
54188
Optimizing Deep Learning Acceleration on FPGA for Real-Time and Resource-Efficient Image Classification
Published 2025-01-01“…Deep learning (DL) has revolutionized image classification, yet deploying convolutional neural networks (CNNs) on edge devices for real-time applications remains a significant challenge due to constraints in computation, memory, and power efficiency. This work presents an optimized implementation of VGG16 and VGG19, two widely used CNN architectures, for classifying the CIFAR-10 dataset using transfer learning on field-programmable gate arrays (FPGAs). …”
Get full text
Article -
54189
-
54190
The Development of Microhistorical Databases in Norway. A Historiography
Published 2023-05-01Get full text
Article -
54191
-
54192
Prediction method of 0day attack path based on cyber defense knowledge graph
Published 2022-02-01“…To solve the difficulty of attack detection caused by the 0day vulnerability, a prediction method of 0day attack path based on cyber defense knowledge graph was proposed.The cyber defense knowledge graph was constructed to refine the discrete security data such as threat, vulnerability and asset into the complete and high-related knowledge format by extracting concepts and entities related to network attack from cyber security ontology research finds and databases.Based on the knowledge integrated by the knowledge graph, assumed and restricted the unknown attributes such as the existence, availability and harmfulness of 0day vulnerabilities, and model the concept of "attack" as a relationship between attacker entities and device entities in the knowledge graph to transform the attack prediction to the link prediction of knowledge graph.According to this, apply path ranking algorithm was applied to mine the potential 0day attack in the target system and construct the 0day attack graph.Predicted the 0day attack path by utilizing the scores output by classifiers as the occurrence probabilities of single step attack and computing the occurrence probabilities of different attack paths.The experimental result shows that with the help of complete knowledge system provided by knowledge graph, the proposed method can reduce the dependence of prediction analysis on expert model and overcome the bad influence of 0day vulnerability to improve the accuracy of 0day attack prediction.And utilizing the characteristic that path ranking algorithm reasons based on the structure of graph can also help to backtrack the reasons of predicting results so as to improve the explainability of predicting.…”
Get full text
Article -
54193
The classification of absence seizures using power-to-power cross-frequency coupling analysis with a deep learning network
Published 2025-02-01“…Power-to-power coupling (PPC) is one form of coupling with significant research attesting to its neurobiological significance as well as its computational efficiency, yet has been hitherto unexplored within seizure classification literature. …”
Get full text
Article -
54194
Group-Based Authentication Methods in The OneM2M Ecosystem
Published 2022-12-01“…By using the group management module provided by the IoT service platform and the “auth” mechanism's together, it has been observed that the computational overhead on the devices and the signal traffic in the environment provide up to 4 times efficiency according to performance measurements. …”
Get full text
Article -
54195
Peptidomic analysis of whey protein hydrolysates and prediction of their antioxidant peptides
Published 2022-03-01Get full text
Article -
54196
-
54197
Causality-driven candidate identification for reliable DNA methylation biomarker discovery
Published 2025-01-01Get full text
Article -
54198
Multiresolution Models of DC Traction Power Supply Systems With Reversible Substations
Published 2024-01-01“…Furthermore, it can model the transient effects of pantograph-to-line arcing by inserting arc voltage profiles at the train’s input stage. To increase the computation speed in the long-term energy flow simulation, a low-resolution model simplifies the rectifiers into a series connection of a diode and a controlled voltage source depicting their nonlinear output characteristics and then places a DC voltage source in parallel to form a reverse path for braking power recovery. …”
Get full text
Article -
54199
Numerical Simulations on the Front Motion of Water Permeation into Anisotropic Porous Media
Published 2019-01-01“…Many algorithms have been developed to calculate this water front motion, but few numerical algorithms have been available to calculate the water front motion in anisotropic fluid-solid couplings with high computational efficiency. In this study, a numerical model is proposed to investigate the front motion of water permeation into an anisotropic porous medium. …”
Get full text
Article -
54200
Long-Term Rainfall Information Forecast by Utilizing Constrained Amount of Observation through Artificial Neural Network Approach
Published 2021-01-01“…This research further focuses on ANN computational concepts and develops a neural network for rainfall time series forecasting. …”
Get full text
Article