Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- Information technology 9
- Moral and ethical aspects 9
- Management 8
- computer 8
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- History 4
- Human-computer interaction 4
- Language and languages 4
- Mass media 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- Hospitality industry 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- MATHEMATICS / Mathematical Analysis 3
- Mathematical analysis 3
-
54201
Public management of smart cities: European experience
Published 2022-03-01“…The third group of publications deals with critical aspects of the development of smart governance in practice and the resulting consequences, in particular, the reassessment of the ability of the private sector to develop and implement intelligent technologies, the predominance of a technocratic approach to decision-making, the inability to ensure impartiality and objectivity, the lack of the ability to analyse urban data, cloud computing on digital platforms to stimulate production in a collaborative environment. …”
Get full text
Article -
54202
MORF: Multi-view oblique random forest for hepatotoxicity prediction
Published 2025-02-01Get full text
Article -
54203
Parameter Extraction for Photovoltaic Models with Flood-Algorithm-Based Optimization
Published 2024-12-01“…These findings establish the FLA as a computationally efficient and reliable approach to PV parameter extraction, with promising implications for advancing PV system design and simulation.…”
Get full text
Article -
54204
Fast algorithms for classical specifications of stabiliser states and Clifford gates
Published 2025-01-01“…The stabiliser formalism plays a central role in quantum computing, error correction, and fault tolerance. Conversions between and verifications of different specifications of stabiliser states and Clifford gates are important components of many classical algorithms in quantum information, e.g. for gate synthesis, circuit optimisation, and simulating quantum circuits. …”
Get full text
Article -
54205
Identification of Filovirus Entry Inhibitors from Marine Fungus-Derived Indole Alkaloids
Published 2025-01-01Get full text
Article -
54206
Modeling and Optimization of Multiaction Dynamic Dispatching Problem for Shared Autonomous Electric Vehicles
Published 2021-01-01“…Results show that (1) the Kuhn–Munkres algorithm ensures the computational effectiveness in the large-scale real-time application of the AMoD system; (2) the second optimization model considering long-term return can decrease average user waiting time and achieve a 2.78% increase in total revenue compared with the first model; (3) and integrating combinatorial optimization theory with reinforcement learning theory is a perfect package for solving the multiaction dynamic dispatching problem of SAEVs.…”
Get full text
Article -
54207
Pneumonia detection from X-ray images using federated learning–An unsupervised learning approach
Published 2025-02-01Get full text
Article -
54208
Ice‐Marginal Proglacial Lakes Across Greenland: Present Status and a Possible Future
Published 2022-06-01Get full text
Article -
54209
DARE: A decentralized association rules extraction scheme for embedded data sets in distributed IoT devices
Published 2020-10-01“…Performing knowledge extraction in a decentralized approach is a computational challenge considering the tight storage and processing constraints of IoT devices, unlike deep learning, which demands a massive amount of data, memory, and processing capability. …”
Get full text
Article -
54210
Dynamic Analysis of a Rigid Body Mounting System with Flexible Foundation Subject to Fluid Loading
Published 2001-01-01Get full text
Article -
54211
A System of Remote Patients’ Monitoring and Alerting Using the Machine Learning Technique
Published 2022-01-01“…The proposed methodology makes use of different machine learning algorithms along with cloud computing for continuous data storage. Over the years, these technologies have resulted in significant advancements in the healthcare industry. …”
Get full text
Article -
54212
Unlocking the Research Potential of Early Modern Dutch Maps
Published 2025-01-01“…This approach highlights the potential of combining historical cartography with computational tools to empower large-scale geographic and historical research. …”
Get full text
Article -
54213
-
54214
Anonymous trust management scheme of VANET based on attribute signature
Published 2023-04-01“…Trust management mechanisms can solve the authenticity assessment problem of messages and establish trust between communication entities in the VANET.However, current trust management schemes lack an effective privacy protection mechanism, leading to privacy concerns for vehicles when binding their identity with their trust level.Based on the anonymity of attribute-based signature, an anonymous trust management scheme was proposed for VANET.The trust level of the vehicle was maintained by the trusted authority.The trust level of vehicles and the current time were taken as the attribute identity set of the vehicle, so as to realize the binding of the anonymous vehicle identity with its trust level, which could provide the privacy protection of vehicles.In addition, the timely update of attribute signature private key could resist false reputation attack and the trust level of the vehicle could be verified anonymously while the attribute signature was verified.Furthermore, the pseudonym was used to hide the real identity of the vehicle, enabling only the trusted authority could parse the real identity of vehicles from the pseudonym to update their trust level, and providing legal and secure tracking of the malicious vehicle identity vehicle.Under the general group model, the attribute-based signature scheme is proven to satisfy the security of unforgerability.The security analysis further shows that the scheme protects the identity and location privacy of vehicles, enables only the trusted authority to legally track malicious vehicles, resists false reputation attacks, ensures communication integrity, and resists replay attacks.Performance analysis confirms that the proposed scheme has better computation and communication efficiency than existing schemes.…”
Get full text
Article -
54215
Correlation analysis between coiling tension and the sleeve's hoop stress
Published 2024-01-01“…This analytical solution not only holds promise for predicting the behavior of various thick-walled cylinders produced through different manufacturing processes involving coiling but also facilitates integration with monitoring systems to mitigate slumping during steel rolling operations, all while minimizing computational burden.…”
Get full text
Article -
54216
Brain tumor segmentation by deep learning transfer methods using MRI images
Published 2024-06-01“…Among such models, VGG16, VGG19, Mobilenetv2, Inception, Efficientnetb7, InceptionResnetV2, DenseNet201, DenseNet121 were used. The computational experimental analysis performed in the paper on a set of MRI brain images showed that the best encoder model for the above deep models was the DenseNet121 model with the following values of segmentation metrics Mean IoU of 91.34%, Mean Dice of 94.26%, Accuracy of 94.22%. …”
Get full text
Article -
54217
Numerical study of crack path by MMCG specimen using M integral
Published 2016-01-01“…The stability is shown for the opening mode (Mode I), the shear mode (Mode II), and the mixed mode of 15°, 30°, 45°, 60°, 75° by computing the energy release rate versus the crack length. …”
Get full text
Article -
54218
Graph Convolutional Network with Neural Collaborative Filtering for Predicting miRNA-Disease Association
Published 2025-01-01“…<b>Conclusions:</b> We anticipate that our model could not only serve as an effective tool for predicting disease-related miRNAs but could be employed as a universal computational framework for inferring relationships across biological entities.…”
Get full text
Article -
54219
A Model-Driven Realization of AUV Controllers Based on the MDA/MBSE Approach
Published 2020-01-01“…The paper brings out stepwise adapted AUV dynamics for control that are then combined with the specialization of MDA/MBSE features as follows: the computation independent model (CIM) is defined by the specification of the use-case model together with hybrid automata to gather the requirement analysis for control; the platform-independent model (PIM) is then designed by specializing the real-time UML/SysML’s features including main control capsules that depict structures and behaviors of controllers in detail; and the detailed PIM is subsequently converted into the platform-specific model (PSM) by object-oriented platforms to rapidly implement the AUV controller. …”
Get full text
Article -
54220
In silico drug repurposing at the cytoplasmic surface of human aquaporin 1.
Published 2025-01-01“…A small set of compounds which could impede water transport through human AQP1 have been identified in this computational screening study.…”
Get full text
Article