Search alternatives:
networks » network (Expand Search)
Showing 641 - 660 results of 740 for search '"Computer Networks"', query time: 0.12s Refine Results
  1. 641

    Research on information extraction methods for historical classics under the threshold of digital humanities by Lifan HAN, Zijing JI, Zirui CHEN, Xin WANG

    Published 2022-11-01
    “…Digital humanities aims to use modern computer network technology to help traditional humanities research.Classical Chinese historical books are the important basis for historical research and learning, but since their writing language is classical Chinese, it is quite different from the vernacular Chinese in grammar and meaning, so it is not easy to read and understand.In view of the above problems, the solution to extract entities and relations in historical books based on pre-trained models was proposed to obtain the rich information contained in historical texts effectively.The model usedmulti-level pre-training tasks instead of BERT's original pre-training tasks to fully capture semantic information.And the model added some structures such as convolutional layers and sentence-level aggregations on the basis of the BERT model to optimize the generated word representation further.Then, in view of the scarcity of classical Chinese annotation data, a crowdsourcing system for the task of labeling historical classics was constructed, high-quality, large-scale entity and relation data was obtained and the classical Chinese knowledge extraction dataset was constructed.So it helped to evaluate the performance of the model and fine-tune the model.Experiments on the dataset constructed in this paper and on the GulianNER dataset demonstrated the effectiveness of the model proposed in this paper.…”
    Get full text
    Article
  2. 642

    Waiting Time Control Chart for M/G/1 Retrial Queue by Yih-Bey Lin, Tzu-Hsin Liu, Yu-Cheng Tsai, Fu-Min Chang

    Published 2024-09-01
    “…Retrial queues are used extensively to model many practical problems in service systems, call centers, data centers, and computer network systems. The average waiting time is the main observable characteristic of the retrial queues. …”
    Get full text
    Article
  3. 643

    Neuronal adaptation translates stimulus gaps into a population code. by Chun-Wei Yuan, Leila Khouri, Benedikt Grothe, Christian Leibold

    Published 2014-01-01
    “…Here we study the transition to a population code for auditory gap stimuli both in neurophysiological recordings and in a computational network model. Independent component analysis (ICA) of experimental data from the inferior colliculus of Mongolian gerbils reveals that the network encodes different gap sizes primarily with its population firing rate within 30 ms after the presentation of the gap, where longer gap size evokes higher network activity. …”
    Get full text
    Article
  4. 644

    Three-Way Merging Algorithm for Structured Data by Jan Janech, Patrik Hrkut, Matej Mesko, Marek Tavac

    Published 2025-01-01
    “…This also means that the user must be constantly connected to the data source via a computer network. As a result, each user always has instant access to up-to-date data. …”
    Get full text
    Article
  5. 645

    Assessment methodology for security of an automated control system of critical information infrastructure against DDoS attacks based on Monte Carlo simulation by V. A. Voevodin, V. S. Chernyaev, D. S. Burenok, I. V. Vinogradov

    Published 2023-05-01
    “…A possible direction for further research is to study the issue of computer network security, taking into account the features of a specific topology.…”
    Get full text
    Article
  6. 646

    The role of the Internet in the modern life of children and teenagers: analysis of a sociological survey by S. E. Titor

    Published 2023-03-01
    “…Achievements in the field of technology, which serve as the foundation of the emerging modern information society, have led to the rapid development of the Internet – a global computer network. The Internet is a mean of social communication that has both positive and negative effects on the global community. …”
    Get full text
    Article
  7. 647

    Dynamic QoS-aware intelligent edge computing resource management algorithm for body area networks by MU Siqi, WEN Shuo, LU Yang, AI Bo

    Published 2024-12-01
    “…The existing resource allocation methods in edge computing network are difficult to efficiently and flexibly support dynamic QoS of multi-source heterogeneous tasks in BAN. …”
    Get full text
    Article
  8. 648

    PREVENTION OF DEVIANT BEHAVIOUR OF MINORS IN THE TERRITORY OF THE STAVROPOL KRAI: A MODERN LEGAL AND INSTITUTIONAL ANALYSIS by O. Pogozheva, S. Pliev

    Published 2021-09-01
    “…Today, the negative influence of the media, social networks, computer network games especially determines the deviant behavior of adolescents. …”
    Get full text
    Article
  9. 649

    «Potok» – distributed platform for modeling digital twins of the GLONASS by R. S. Kulikov, S. V. Vishnyakov, A. P. Malyshev, M. A. Orlova, T. А. Brovko

    Published 2024-03-01
    “…The technical implementation of the platform consists of a distributed computing network, a repository of computer models, as well as a node for modelling session management. …”
    Get full text
    Article
  10. 650

    Networked Time and the ‘Common Ruin of the Contending Classes’ by Robert Hassan

    Published 2013-08-01
    “…This is a logic that functions at the global level and operates at computer network driven speeds, incorporating in its wake not only the polity, but economy and society, too. …”
    Get full text
    Article
  11. 651

    Understanding the Energy Transition by Analyzing the IT Revolution. An Infrastructural Reading to Direct Design Approaches Toward Energy Sustainability by Davide Crippa, Massimiliano Cason Villa

    Published 2024-06-01
    “…Thus, the analysis aims to analyze the limitations and potentials of the logical architecture models of the computer network, which have already been addressed and solved in the past, to reread the macro-strategies of current energy policies, based on the one hand on a technocratic vision that works on sources and infrastructure (that we can define as client server) and on the other hand on cooperation between actors and society (that we can define as peer to peer). …”
    Get full text
    Article
  12. 652

    INFORMATION SECURITY CONTROLS AS DETERMINANT OF CONTINUITY OF INFORMATION SYSTEM WORK by Edin Osmanbegović, Nedžad Pirić, Mirza Suljić

    Published 2017-11-01
    “…About 32% of these companies have the controls at the level of computer network, 22% of them have the control at the operating system level, while 38% have the control at the software application level. …”
    Get full text
    Article
  13. 653

    Real Time Application for Automatic Object and 3D Position Detection and Sorting with Robotic Manipulator by Tichaona Jonathan Makomo, Barış Boru, Kenan Erin

    Published 2020-08-01
    “…The information is therefore sent to the robot to create a path through a server-to-client connection over a computer network in real time.…”
    Get full text
    Article
  14. 654

    Regional experience in organizing the protection of minors from a destructive information environment (by the example of non-central regions) by S. E. Titor

    Published 2023-03-01
    “…Achievements in the field of new technologies, on which the formation of the modern information society is based, have led to the rapid development of the global computer network Internet. The Internet as a means of social communication has both a positive impact on the world community and has negative consequences. …”
    Get full text
    Article
  15. 655

    Ensuring Privacy and Security on Banking Websites in Malaysia: A Cookies Scanner Solution by Yi Hong Tay, Shih Yin Ooi, Ying Han Pang, Ying Huey Gan, Sook Ling Lew

    Published 2023-09-01
    “…When users use a computer network, their data will be saved by the web server as cookies, including their private information. …”
    Get full text
    Article
  16. 656

    A Secure and Reliable Fog-Enabled Architecture Using Blockchain With Functional Biased Elliptic Curve Cryptography Algorithm for Healthcare Services by charu awasthi, Satya Prakash, Prashant Kumar Mishra

    Published 2024-12-01
    “…Fog computing is an emerging technology that extends the capability and efficiency of cloud computing networks by acting as a bridge among the cloud and the device. …”
    Get full text
    Article
  17. 657
  18. 658
  19. 659
  20. 660