Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- Information technology 9
- Moral and ethical aspects 9
- Management 8
- computer 8
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- History 4
- Human-computer interaction 4
- Language and languages 4
- Mass media 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- Hospitality industry 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- MATHEMATICS / Mathematical Analysis 3
- Mathematical analysis 3
-
54961
Integrating AutoGluon for Real-Time Monitoring and Classification of Dental Equipment Performance
Published 2025-01-01“…The Weighted Ensemble model achieved a 100% accuracy, balanced accuracy and MCC score of 1.0 (indicating perfect reliability in classifying equipment states as ’Optimal,’ ’Warning,’ and ’Failure’). The system was computationally efficient, generalizable across classes, and showed robust generalization, making it suitable for real-time deployment. …”
Get full text
Article -
54962
Blockchain-based cross-data center anonymous and verifiable identity authentication scheme
Published 2024-04-01“…With the progression of big data and cloud computing technologies, there has been an escalating trend in cross-institutional data sharing and interaction within the financial sector. …”
Get full text
Article -
54963
Embedded Rough-Neck Helmholtz Resonator Low-Frequency Acoustic Attenuator
Published 2024-12-01“…To achieve low-frequency absorption within a limited spatial volume, this study proposes an embedded Helmholtz resonator featuring a roughened neck and establishes a numerical computational model that incorporates thermos viscous effects. …”
Get full text
Article -
54964
Integrating Model‐Informed Drug Development With AI: A Synergistic Approach to Accelerating Pharmaceutical Innovation
Published 2025-01-01“…By integrating the predictive power of computational models and the data‐driven insights of AI, the synergy between these approaches has the potential to accelerate drug discovery, optimize treatment strategies, and usher in a new era of personalized medicine, benefiting patients, researchers, and the pharmaceutical industry as a whole.…”
Get full text
Article -
54965
-
54966
Internet of things enabled smart agriculture: Current status, latest advancements, challenges and countermeasures
Published 2025-02-01“…Smart agriculture, interchangeably known as smart farming, utilizes IoT and related enabling technologies such as cloud computing, artificial intelligence, and big data in agriculture and offers the potential to enhance agricultural operations by automating and making intelligent decisions, resulting in increased efficiency and a better yield with minimum waste. …”
Get full text
Article -
54967
Survey on blockchain privacy protection techniques in cryptography
Published 2022-08-01“…In recent years, the issue of data privacy has attracted increased attention, and how to achieve effective privacy protection in blockchain is a new research hotspot.In view of the current research status and development trend of blockchain in privacy protection, the privacy protection methods of blockchain in transaction address,prophecy machine and smart contract were explained, and the privacy strategies of blockchain in the protection of basic elements were summarized.Based on high-level literature at home and abroad, two types of blockchain cryptographic protection methods and usage scenarios were analyzed, including special cryptographic primitives and post-quantum cryptography.The advantages and disadvantages of seven cryptographic techniques applicable to current blockchain privacy protection were also reviewed, including attribute-based encryption, special data signature, homomorphic encryption, secure multi-party computation, zero-knowledge proofs, and lattice ciphers.It was concluded that the privacy protection of blockchain applications cannot be achieved without cryptographic technology.Meanwhile, the blockchain privacy protection technologies were analyzed in terms of both basic element protection and cryptographic protection.It was concluded that it was difficult to effectively solve the privacy problem only from the application and contract layers of the blockchain, and various cryptographic technologies should be used to complement each other according to different needs and application scenarios.In addition, according to the current development status of blockchain privacy cryptography, the narrative was developed from blockchain basic element protection and cryptography-based protection.From the perspectives of both endogenous basic element security and exogenous cryptographic privacy security, basic element privacy protection should be studied first, followed by an in-depth analysis of cryptographic protection techniques for blockchain privacy.The strengths and weaknesses and the potential value of the privacy handling aspects of the corresponding safeguards should be measured in terms of the development of technology in conjunction with practical applications, while considering the timeliness of the technology.Finally, an outlook on the future direction of blockchain privacy protection technologies was provided, indicating the issues that need to be addressed in focus.…”
Get full text
Article -
54968
-
54969
Enhancing prostate cancer segmentation in bpMRI: Integrating zonal awareness into attention-guided U-Net
Published 2025-01-01Get full text
Article -
54970
A Parametric Study of Performance of Two Solar Wind Velocity Forecasting Models During 2006–2011
Published 2022-09-01“…Besides these MHD frameworks, the Heliospheric Upwind eXtrapolation (HUX) technique can extrapolate SW from inner heliospheric boundaries to L1 and can give a reliable estimate of the SW velocity at L1 comparable to MHD models but in a short computational time. We carried out an extensive parametric study of the performance of the Model1 (PFSS+WSA+HUX) and Model2 (PFSS+SCS+WSA+HUX) for SW velocity prediction at L1. …”
Get full text
Article -
54971
Survey on RDMA protocol applications and security protection technologies
Published 2024-04-01“…The remote direct memory access (RDMA) technology, which has been effectively utilized to enhance data transfer rates and reduce CPU utilization, has played a significant role in various domains such as cross-regional data center transfers, high-performance computing, and rapid data read/write operations. However, despite its emerging status, RDMA has been lacking in widely recognized security solutions. …”
Get full text
Article -
54972
Underutilized wild edible fungi and their undervalued ecosystem services in Africa
Published 2023-03-01Get full text
Article -
54973
General Log-Linear Weibull Model Combining Vibration and Temperature Characteristics for Remaining Useful Life Prediction of Rolling Element Bearings
Published 2020-01-01“…According to the experimental results, the presented approach provides superior prediction precision and lower computational cost than other approaches for bearings under constant or variable operating conditions.…”
Get full text
Article -
54974
Multi-objective optimization of kitchen comfort based on arithmetic superposition index P
Published 2025-02-01“…This study adopts a combination of orthogonal experiments and computational fluid dynamics (CFD) simulations to study the exhaust characteristics of range hoods under different structural parameters and compares and analyzes the rationality and effectiveness of different auxiliary ventilation methods in kitchen ventilation systems to propose the optimal solution. …”
Get full text
Article -
54975
Using FinBERT as a refined approach to measuring impression management in corporate reports during a crisis
Published 2023-07-01“…FinBERT, a more advanced machine learning model of natural language processing (NLP), was used to investigate the change in net sentiment expressed in the Chairman’s Statements of a sample of South African JSE-listed companies before and during the pandemic. A computation of net sentiment for each report was performed. …”
Get full text
Article -
54976
Effects of Age and Gender on Hand Motion Tasks
Published 2015-01-01“…Wearable and wireless motion sensor devices have facilitated the automated computation of speed, amplitude, and rhythm of hand motion tasks. …”
Get full text
Article -
54977
Correlating disordered activation domain ensembles with gene expression levels
Published 2025-03-01Get full text
Article -
54978
-
54979
Location-Aware Cross-Layer Design Using Overlay Watermarks
Published 2007-01-01“…Therefore, efficient collaborative signal processing algorithms that consume less energy for computation and less bandwidth for communication are needed. …”
Get full text
Article -
54980
Geo-Ecological Analysis of the Causes and Consequences of Flooding in the Western Region of Kazakhstan
Published 2025-01-01Get full text
Article