Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
861
Impact of computing platforms on classifier performance in heart disease prediction
Published 2025-04-01“…This work explores how different computing platforms influence the accuracy of classification results when employing the same models. …”
Get full text
Article -
862
Soft computing approaches of direct torque control for DFIM Motor's
Published 2025-02-01Get full text
Article -
863
TREE: Bridging the gap between reconfigurable computing and secure execution
Published 2025-06-01“… Trusted Execution Environments (TEEs) have become a pivotal technology for securing a wide spectrum of security-sensitive applications. With modern computing systems shifting to heterogeneous architectures, integrating TEE support into these systems is paramount. …”
Get full text
Article -
864
Continual Learning With Neuromorphic Computing: Foundations, Methods, and Emerging Applications
Published 2025-01-01“…After introducing the CL background and the energy efficiency challenges, we provide an extensive background of low-power neuromorphic computing systems including encoding techniques, neuronal dynamics, network architectures, learning rules, neuromorphic hardware processors, software and hardware frameworks, neuromorphic datasets, benchmarks, and evaluation metrics. …”
Get full text
Article -
865
Knowledge Distillation in Object Detection for Resource-Constrained Edge Computing
Published 2025-01-01“…Edge computing, a distributed computing paradigm that places small yet capable computing devices near data sources and IoT sensors, is gaining widespread adoption in various real-world applications, such as real-time intelligent drones, autonomous vehicles, and robotics. …”
Get full text
Article -
866
Mitigation of Corruption by Implementing e-Government Using Soft Computing
Published 2022-01-01“…We believe that a soft computing-fuzzy logic algorithm is an appropriate method for evaluating and determining the effective factors, and hence might lead to a feasible way to the success of e-government. …”
Get full text
Article -
867
FIST GEOINFORMATION SYSTEM MODEL USING FOG COMPUTING IN DESTABILIZATION
Published 2021-04-01“…The developed model and performance indicators can be used to design new and evaluate existing geographic information systems.…”
Get full text
Article -
868
A segment-based framework for explainability in animal affective computing
Published 2025-04-01“…In this paper, we propose a framework aimed at enhancing explainability in the field of animal affective computing. Assuming the availability of a classifier for a specific affective state and the ability to generate saliency maps, our approach focuses on evaluating and comparing visual explanations by emphasizing the importance of meaningful semantic parts captured as segments, which are thought to be closely linked to behavioral indicators of affective states. …”
Get full text
Article -
869
Virtual machine co-residency method on cloud computing platform
Published 2018-11-01Get full text
Article -
870
SAPA-based approach for defending DoS attacks in cloud computing
Published 2017-04-01“…Denial of service (DoS) attack was one of the major threats to cloud computing.Security access path algorithm (SAPA) used node route table (NRT) to compose security access path.It simplified role nodes of traditional secure overlay services (SOS),and periodically updated role nodes,and cached security access paths.Therefore,SAPA was more appropriate for cloud computing to defend DoS attacks.Based on the turn routing architecture of cloud computing,the mathematical model of SAPA was built and its performance was analyzed in theory.The performance of SAPA was tested in OMNeT++ experimental platform.Also,the Test-bed experiments were performed to evaluate the effectiveness of SAPA for defending DoS attack.Experimental results show that comparing with SOS,SAPA can degrade the impact of communication success rate caused by DoS attack effectively,and guarantees the access delay small enough.…”
Get full text
Article -
871
Dynamic and Stochastic Models for Application Management in Distributed Computing Systems
Published 2025-02-01“…We developed multiple prototypes to investigate the organization of distributed applications under various system scales and workloads. To evaluate the system’s effectiveness and reliability, we computed steady-state probabilities using enhanced Markov models specifically designed for cloud, fog, and edge settings. …”
Get full text
Article -
872
Leveraging cognitive computing for advanced behavioral and emotional data insights
Published 2025-12-01“…Through comprehensive data analysis, we identify the primary factors driving current mental health concerns in student populations and evaluate the practical applications of cognitive computing in mitigating these issues. …”
Get full text
Article -
873
Dynamic Threshold-Based Resource Management for Fog Computing Environments
Published 2025-01-01“…To further support balanced workload distribution, a Quota-Based Round-Robin (QRR) scheduler is introduced, ensuring fairness and low computational overhead across fog nodes. Extensive experimental evaluations demonstrate that DTRM significantly reduces the resource redirection count compared to Static Threshold (ST), Deficit Round Robin (DRR), and Best-Effort (BE) schemes. …”
Get full text
Article -
874
Control of Linear-Threshold Brain Networks via Reservoir Computing
Published 2024-01-01“…To mimic this setup, this paper examines the use of reservoir computing to control a linear-threshold network brain model to a desired trajectory. …”
Get full text
Article -
875
Edge Computing-Enabled Train Fusion Positioning: Modeling and Analysis
Published 2025-03-01“…An innovative approach, which combines multi-sensor information fusion with edge computing, is proposed to reduce the computational load on onboard systems and accelerate data processing. …”
Get full text
Article -
876
Comprehensive Review on Facets of Cloud Computing in Context of Security and Privacy
Published 2025-07-01“…The advent of information and communication technologies (ICT) has increased the appeal of cloud computing, allowing enterprises scalability and a pay-as-you-go pricing model. …”
Get full text
Article -
877
Reinforcement-Learning-Based Edge Offloading Orchestration in Computing Continuum
Published 2024-11-01“…The AI-driven applications and large data generated by IoT devices connected to large-scale utility infrastructures pose significant operational challenges, including increased latency, communication overhead, and computational imbalances. Addressing these is essential to shift the workloads from the cloud to the edge and across the entire computing continuum. …”
Get full text
Article -
878
NeuroMorse: a temporally structured dataset for neuromorphic computing
Published 2025-01-01“…Neuromorphic engineering aims to advance computing by mimicking the brain’s efficient processing, where data is encoded as asynchronous temporal events. …”
Get full text
Article -
879
Evolutionary Algorithms and Quantum Computing: Recent Advances, Opportunities, and Challenges
Published 2025-01-01“…This ongoing progress creates an opportunity to implement and evaluate quantum-inspired metaheuristics on real quantum devices, with the aim of uncovering potential computational advantages. …”
Get full text
Article -
880
CMOS Single-Photon Avalanche Diode Circuits for Probabilistic Computing
Published 2024-01-01“…Measured results from the SPAD design space show that even extremely small SPADs are suitable for probabilistic computing purposes, and that high dark count rates are not detrimental either, so SPADs for probabilistic computing are actually easier to integrate in standard CMOS processes. …”
Get full text
Article