Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
1981
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing
Published 2023-12-01“…The proposed auditing scheme in this paper can be used to guarantee the correctness and the completeness of the stored data in 5G-enabled software-defined edge computing. The auditing results of the distributed data in the proposed scheme can be used as an important basis for evaluating the trustworthiness of the edge devices. …”
Get full text
Article -
1982
Embankment Breach Simulation and Inundation Mapping Leveraging High-Performance Computing for Enhanced Flood Risk Prediction and Assessment
Published 2024-11-01“…This research delves into a case study on simulating embankment breaches to evaluate the extent of flooding. Leveraging advanced hydrodynamic models validated through high-performance computing (HPC) systems, and integrating real-time data assimilation, we aim to improve accuracy in flood forecasting. …”
Get full text
Article -
1983
I-MPaFS: enhancing EDoS attack detection in cloud computing through a data-driven approach
Published 2024-10-01“…Abstract Cloud computing offers cost-effective IT solutions but is susceptible to security threats, particularly the Economic Denial of Sustainability (EDoS) attack. …”
Get full text
Article -
1984
How fast does the WallGo? A package for computing wall velocities in first-order phase transitions
Published 2025-04-01“…Abstract WallGo is an open-source software designed to compute the bubble wall velocity in first-order cosmological phase transitions. …”
Get full text
Article -
1985
Drone-Enabled AI Edge Computing and 5G Communication Network for Real-Time Coastal Litter Detection
Published 2024-12-01“…High-speed 5G communication supports seamless data transmission, allowing efficient monitoring. We evaluated drone performance under optimal flying heights above ground of 5 m, 7 m, and 10 m, analyzing accuracy, precision, recall, and F1-score. …”
Get full text
Article -
1986
Fortifying IoT Infrastructure Using Machine Learning for DDoS Attack within Distributed Computing-based Routing in Networks
Published 2024-06-01“…We evaluate these algorithms using metrics such as the confusion matrix, F1 score, and AUC-ROC to determine their performance in managing imbalanced datasets and generating meaningful insights. …”
Get full text
Article -
1987
Analysis of chemical reactive nanofluid flow on stretching surface using numerical soft computing approach for thermal enhancement
Published 2024-12-01“…In this work, computational intelligence methodologies are used to investigate the trihybrid nanofluid, a new theoretical model with remarkable thermal transmission properties to enhance liquid thermal performance. …”
Get full text
Article -
1988
Reducing time and computing costs in EC-Earth: an automatic load-balancing approach for coupled Earth system models
Published 2025-06-01“…Determining the appropriate number of resources to use for each component in coupled ESMs is crucial for efficient utilization of the high-performance computing (HPC) infrastructures used in climate modeling. …”
Get full text
Article -
1989
The Need for Accurate Alignment in Natural Language System Evaluation
Published 2021-03-01Get full text
Article -
1990
A Critique and Improvement of an Evaluation Metric for Text Segmentation
Published 2021-03-01Get full text
Article -
1991
Graph-Based Word Alignment for Clinical Language Evaluation
Published 2022-05-01Get full text
Article -
1992
Blockchain and RL-Based Secured Task Offloading Framework for Software-Defined 5G Edge Networks
Published 2025-01-01“…Experimental evaluations demonstrate that SAGE reduces task offloading delays by 36% and task durations by 30% compared to baseline methods under varying load and energy constraints.…”
Get full text
Article -
1993
Assurance in Advanced 5G Edge Continuum
Published 2024-01-01“…., Multi-access Edge Computing) and powerful and reliable connectivity links (i.e., network slices). …”
Get full text
Article -
1994
-
1995
Grammatical error correction for low-resource languages: a review of challenges, strategies, computational and future directions
Published 2025-07-01“…Despite notable progress, this review identifies gaps in evaluation methodologies and typology-specific solutions, calling for future innovations in multilingual modeling, dataset creation, and computationally efficient GEC systems tailored to the unique needs of low-resource languages.…”
Get full text
Article -
1996
Enhancing Multi-Key Fully Homomorphic Encryption with Efficient Key Switching and Batched Multi-Hop Computations
Published 2025-05-01“…We propose novel algorithms for evaluation key generation and key switching that simplify the computation while allowing each party to independently precompute and share its evaluation keys, thereby reducing both computational overhead and storage costs. …”
Get full text
Article -
1997
Computationally derived linguistic features of L2 narrative essays and their relations to human-judged writing quality
Published 2025-07-01“…Abstract Computational tools have become increasingly prevalent in the analysis and evaluation of various linguistic dimensions in second language (L2) writing pedagogy and research. …”
Get full text
Article -
1998
Rockburst Monitoring in Deep Coalmines with Protective Coal Panels Using Integrated Microseismic and Computed Tomography Methods
Published 2020-01-01“…To reduce such type of rockburst, this study firstly proposes a mathematic model to analyse the overall static stress distribution in the protective panel based on the mining practice in Longyun coalmine, Shandong Province, China. To evaluate the stress concentration caused by geological defects in the protective panel, a new rockburst evaluation index is proposed based on the computed tomography (CT) method. …”
Get full text
Article -
1999
Target screening and optimization of candidate compounds for breast cancer treatment using bioinformatics and computational chemistry approaches
Published 2025-05-01“…Molecular docking and molecular dynamics (MD) simulations were performed to evaluate the binding stability between selected compounds and the human adenosine A1 receptor-Gi2 protein complex (PDB ID: 7LD3). …”
Get full text
Article -
2000
Development of a Computer Vision-Based Method for Sizing and Boat Error Assessment in Olive Pitting Machines
Published 2025-06-01“…To address these challenges, this study presents a novel computer vision (CV) system integrated into a commercial DRR machine. …”
Get full text
Article