Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
1001
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
1002
Benchmarking In-Sensor Machine Learning Computing: An Extension to the MLCommons-Tiny Suite
Published 2024-10-01“…This paper proposes a new benchmark specifically designed for in-sensor digital machine learning computing to meet an ultra-low embedded memory requirement. …”
Get full text
Article -
1003
Quantum Vulnerability Analysis to Guide Robust Quantum Computing System Design
Published 2024-01-01“…By evaluating the CQV with well-known benchmarks on three 27-qubit quantum computers, the CQV success estimation outperforms the estimated probability of success state-of-the-art prediction technique by achieving on average six times less relative prediction error, with best cases at 30 times, for benchmarks with a real SR rate above 0.1%. …”
Get full text
Article -
1004
Possibilities of liver density estimation according to noncontrast computed tomography
Published 2020-03-01“…With allowance made for the widespread prevalence of diffuse liver diseases, non-alcoholic fatty liver disease in particular, there is a need for the most objective evaluation of the state of this organ. One of the most important criteria for this evaluation is to estimate liver tissue density values. …”
Get full text
Article -
1005
Multislice computed tomography urography in the diagnosis of urinary tract diseases
Published 2011-01-01“…Background/Aim. Multislice computed tomography (MSCT) has triggered considerable changes in uroradiological imaging. …”
Get full text
Article -
1006
ALGORITHMIZATION OF COMPUTER DESIGNING OF FOUNDRY DETAILS WITH THE HELP OF CAD-SYSTEMS
Published 2005-11-01“…The mathematical model for generalized evaluation of computer-aided method of the complex detail creation by means of CAD-system is offered. …”
Get full text
Article -
1007
-
1008
Examination of the Computed Molecular Properties of Compounds Selected for Clinical Development
Published 2003-06-01“…We have conducted a systematic evaluation of the calculated molecular properties of compounds in clinical development and have found that the development process selects for compounds that have certain computed physical properties. …”
Get full text
Article -
1009
Realization and discussion of selected artificial intelligence algorithms in computer games
Published 2025-03-01“… The study explores the usage of reinforcement learning algorithms in computer card games, such as Proximal Policy Optimization and Monte Carlo Tree Search. …”
Get full text
Article -
1010
Computation of The Efficiency ofHarmonic Generation Using Cascading Configuration.
Published 2004-03-01Get full text
Article -
1011
-
1012
From speech signal to syntactic structure: A computational implementation
Published 2025-01-01“…A system evaluation with the German data showed good results for this new combination of automatic speech signal analysis and computational grammars, which takes a significant step towards a linguistically fine-grained computational analysis and hence towards real automatic speech understanding. …”
Get full text
Article -
1013
Bus Admittance Matrix Revisited: Performance Challenges on Modern Computers
Published 2024-01-01“…Without using the admittance matrix, nodal power injections and the corresponding sparse Jacobian can be computed by an element-wise method, which consists of a highly regular, vectorized evaluation step and a reduction step. …”
Get full text
Article -
1014
Generalization of Computer Assisted Prosody Training: Quantitative and Qualitative Findings
Published 2004-01-01“…Two experiments investigated the effectiveness of computer-assisted prosody training, its generalization to novel sentences and segmental accuracy, and the relationship between prosodic and lexical information in long-term memory. …”
Get full text
Article -
1015
A comprehensive survey of robust deep learning in computer vision
Published 2023-11-01“…Besides, this survey elaborates on the current robustness evaluation approaches, which require further exploration. …”
Get full text
Article -
1016
Dynamic Mixture of Experts for Adaptive Computation in Character-Level Transformers
Published 2025-06-01“…This paper challenges the prevailing assumption that Mixture of Experts (MoE) consistently improves computational efficiency through a systematic evaluation of MoE variants in Transformer models. …”
Get full text
Article -
1017
Damage Behaviour of Quasi-Brittle Composites: Mathematical and Computational Aspects
Published 2025-04-01“…In the present paper, an evaluation of the damage behaviour of quasi-brittle composites exposed to mechanical, thermal, and other loads is studied by means of viscoelastic and/or viscoplastic material models, applying some non-local regularisation techniques to the initiation and development of damages. …”
Get full text
Article -
1018
Single‐Cell Hi‐C Technologies and Computational Data Analysis
Published 2025-03-01“…This review provides a comprehensive overview, quantitative evaluation of thirteen protocols and practical guidance on computational topics. …”
Get full text
Article -
1019
Computational Analysis and Optimization of Polymer-Based Ankle-Foot Orthoses
Published 2025-01-01“…This work aims to offer a computational evaluation of the mechanical and thermal performance of an ankle-foot orthosis (AFO). …”
Get full text
Article -
1020
A TOPSIS-Based Improved Weighting Approach With Evolutionary Computation
Published 2024-05-01Get full text
Article