Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
5241
-
5242
-
5243
-
5244
Link-Level Evaluation of Uplink Cell-Free MIMO in 5G NR Over Frequency-Selective Channels
Published 2025-01-01Get full text
Article -
5245
-
5246
-
5247
Effect of rituximab on the manifestations of activity and pulmonary function in patients with systemic sclerosis: one-year follow-up evaluation
Published 2019-07-01“…The investigation included 71 patients with a valid diagnosis of SS. Multi-slice spiral computed tomography (MSCT) revealed ILD in 90% of patients. …”
Get full text
Article -
5248
-
5249
On QoS evaluation for ZigBee incorporated Wireless Sensor Network (IEEE 802.15.4) using mobile sensor nodes
Published 2022-02-01“…Subsequently, an attempt to compute the comprehensive recital of a non-beacon mode based 802.15.4/ZigBee integrated WSN network is demonstrated. …”
Get full text
Article -
5250
-
5251
Research on 5G MEC security assessment system and method
Published 2023-08-01“…Multi-access edge computing (MEC) is deployed at the edge of the network, enabling efficient and fast data processing in mobile networks, while also undertaking important security functions, making MEC a prime target for attackers.Therefore, MEC nodes will face huge security risks.How to accurately evaluate and quantify MEC security capabilities is an urgent issue to be solved.For accurately evaluating and quantifying MEC security capabilities, the MEC safety assessment system was proposed in combination with MEC safety risks.The assessment indicators selected in the assessment system comprehensively reflect the basic characteristics of MEC and its complete safety capability.Based on this evaluation system, the MEC security evaluation method was designed by using the analytic hierarchy process (AHP) and fuzzy evaluation, the MEC vulnerability scoring system was creatively proposed, and the evaluation indicators were provided based on the results of MEC vulnerability scoring system, the MEC security capability quantification value was finally calculated.The experimental result proves the effectiveness of the method.…”
Get full text
Article -
5252
AERO: Adaptive Edge-Cloud Orchestration With a Sub-1K-Parameter Forecasting Model
Published 2025-01-01“…Our extensive evaluations on real-world cloud workload datasets demonstrate that AERO achieves comparable prediction accuracy to complex state-of-the-art models with millions of parameters, while significantly reducing model size and computational overhead. …”
Get full text
Article -
5253
Big Five Personality Trait Prediction Based on User Comments
Published 2025-05-01“…Using the PANDORA dataset from Reddit, the RoBERTa and BERT models, including both the base and large variants, were fine-tuned and evaluated to determine their effectiveness in personality trait prediction. …”
Get full text
Article -
5254
-
5255
Investigative prototyping a tissue P system for solving distributed task assignment problem in heterogeneous wireless sensor network
Published 2022-06-01“…The experimental analyses of the proposed method have been self-evaluated as well as compared with the corresponding recent benchmark algorithms under various conditions and its performance metrics are analysed.…”
Get full text
Article -
5256
Introducing KeyRing self‐timed microarchitecture and timing‐driven design flow
Published 2021-11-01Get full text
Article -
5257
Efficient resource allocation in cloud environment using SHO-ANN-based hybrid approach
Published 2024-01-01“…The cloud computing paradigm provides services to users in an on-demand fashion using high-speed Internet. …”
Get full text
Article -
5258
TinyML-enabled fuzzy logic for enhanced road anomaly detection in remote sensing
Published 2025-07-01“…Our framework addresses critical gaps in existing methodologies, such as high computational demands and limited real-time processing capabilities, by leveraging model compression, quantization, and pruning techniques. …”
Get full text
Article -
5259
Medical Data over Sound—CardiaWhisper Concept
Published 2025-07-01“…The receiver, in the form of a mobile phone, tablet, or desktop computer, captures the acoustic signal via its built-in microphone and executes software routines to decode the data. …”
Get full text
Article -
5260