Showing 1,061 - 1,080 results of 8,109 for search 'computing patterns', query time: 0.11s Refine Results
  1. 1061
  2. 1062
  3. 1063

    Consumerisation of IT: Intersection of development streams of business and personal IT by Petrović Marijana, Sakal Marton

    Published 2025-01-01
    “…As a spinout from business IT, personal IT has had a feedback effect on it: the proliferation of computers and mobile devices on the consumer market, combined with affordable Internet-related resources, not only changed personal IT usage patterns, but also redefined the expectations that users have for enterprise software. …”
    Get full text
    Article
  4. 1064
  5. 1065
  6. 1066
  7. 1067
  8. 1068

    Local Binary Pattern–Cycle Generative Adversarial Network Transfer: Transforming Image Style from Day to Night by Abeer Almohamade, Salma Kammoun, Fawaz Alsolami

    Published 2025-03-01
    “…However, existing CycleGAN-based approaches struggle with texture loss, structural inconsistencies, and high computational costs. In our attempt to overcome these challenges, we produced LBP-CycleGAN, a new modification of CycleGAN that benefits from the advantages of a Local Binary Pattern (LBP) that extracts details of texture, unlike traditional CycleGAN, which relies heavily on color transformations. …”
    Get full text
    Article
  9. 1069
  10. 1070

    PaperCAD: A System for Interrogating CAD Drawings Using Small Mobile Computing Devices Combined with Interactive Paper by WeeSan Lee, Thomas F. Stahovich

    Published 2014-01-01
    “…Smartphones have become indispensable computational tools. However, some tasks can be difficult to perform on a smartphone because these devices have small displays. …”
    Get full text
    Article
  11. 1071
  12. 1072

    Differences in Healing of a Horizontal Root Fracture as Seen on Conventional Periapical Radiography and Cone-Beam Computed Tomography by Ronnachat Rothom, Patchanee Chuveera

    Published 2017-01-01
    “…Different locations and healing patterns of horizontal root fractures bear different prognoses. …”
    Get full text
    Article
  13. 1073

    A weighted pattern matching approach for classification of imbalanced data with a fireworks-based algorithm for feature selection by N. K. Sreeja

    Published 2019-04-01
    “…This paper proposes a novel instance-based classification algorithm called Weighted Pattern Matching based Classification (PMC+) for classifying imbalanced data. …”
    Get full text
    Article
  14. 1074
  15. 1075
  16. 1076

    Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network by Weicheng QIU, Xiuzhen CHEN, Yinghua MA, Jin MA, Zhihong ZHOU

    Published 2023-08-01
    “…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
    Get full text
    Article
  17. 1077
  18. 1078

    Hybrid Deep Learning Framework for Continuous User Authentication Based on Smartphone Sensors by Bandar Alotaibi, Munif Alotaibi

    Published 2025-04-01
    “…This research proposes a hybrid deep learning framework that combines techniques from computer vision and sequence modeling, namely, ViT-inspired patch extraction, multi-head attention, and BiLSTM networks, to authenticate users continuously from smartphone sensor data. …”
    Get full text
    Article
  19. 1079
  20. 1080