Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
1101
Text analysis of DNS queries for data exfiltration protection of computer networks
Published 2020-09-01“…To classify the requests in convolutional neural network the use of character embedding for representing the string of a domain name is proposed. Quality evaluation of the trained neural network used for recognition of data exfiltration through domain name system using ROC-analysis is performed.The paper presents the software architecture used for deployment of trained neural network into existing infrastructure of the domain name system targeting practical computer networks protection from data exfiltration. …”
Get full text
Article -
1102
Key Considerations for Real-Time Object Recognition on Edge Computing Devices
Published 2025-07-01“…An example of an application is also presented in this article, which is about real-time power transmission line detection using edge computing devices. The evaluation results show the significance of implementing lightweight models and model compression techniques such as quantized Tiny YOLOv7. …”
Get full text
Article -
1103
Cone Beam Computed Tomography in Oral Cancer: A Scoping Review
Published 2025-05-01“…<b>Objectives</b>: The present scoping review aims to explore and provide an overview of the current applications of cone beam computed tomography (CBCT) in the management of oral cancer. …”
Get full text
Article -
1104
A pair-based task scheduling algorithm for cloud computing environment
Published 2022-01-01“…In the cloud computing environment, scheduling algorithms show the vital role of finding a possible schedule of the tasks. …”
Get full text
Article -
1105
An NVMe-Based Secure Computing Platform With FPGA-Based TFHE Accelerator
Published 2025-01-01“…We defined secure computing instructions to evaluate 14-bit to 14-bit functions using TFHE. …”
Get full text
Article -
1106
THE ROLE OF COMPUTED TOMOGRAPHY IN PATIENTS WITH GASTRIC CANCER IN RADIO-ONCOLOGICAL HOSPITAL
Published 2016-02-01“…Results. The role of computed tomography in the study of gastric carcinoma is mainly represented by the staging of tumor according to the TNM system; CT topometry; assessment of response to neoadjuvant therapy; evaluation of postoperative complications and the post-therapy control. …”
Get full text
Article -
1107
A high-performance tensor computing unit for deep learning acceleration
Published 2025-06-01“…It can readily select proper operators to achieve 96% of the chip peak performance under certain shapes and find the best performance implementation within limited power. The evaluation of a large number of convolution shapes on our tensor computing unit chip shows the generated operators significantly outperform the hand-written ones, achieving 9% higher normalized performance than CUDA according to the silicon data.…”
Get full text
Article -
1108
Paravertebral Mass in a Patient with Hemolytic Anemia: Computed Tomographic Findings
Published 2010-01-01Get full text
Article -
1109
Development of Quizizz-based Learning Media on Basic Computer and Network Subjects
Published 2021-01-01“…This study aims to develop Quizizz in basic computer and network subjects as a learning medium and to see the validity, practicality, and effectiveness of Quizizz as a learning medium in Basic Computer and Network subjects. …”
Get full text
Article -
1110
OESOPHAGEAL DILATATION ON CHEST HIGH-RESOLUTION COMPUTED TOMOGRAPHY IN SYSTEMIC SCLEROSIS
Published 2025-03-01“…Material and Methods: The study included 86 patients. A retrospective evaluation was performed on the demographic data, biochemical and serological tests, and chest high-resolution computed tomography (HRCT) images of the patients. …”
Get full text
Article -
1111
All-You-Can-Compute: Packed Secret Sharing for Combined Resilience
Published 2025-03-01“…For example, for an AES evaluation that protects against t probes and e faults, we improve the randomness complexity of the state-of-the-art construction when t + e > 3, leading to an improvement of up to a factor of 2.41. …”
Get full text
Article -
1112
Research on Pork Cut and Freshness Determination Method Based on Computer Vision
Published 2024-12-01“…To improve the precision and efficiency of pork quality assessment, an automated detection method based on computer vision technology is proposed for evaluating different parts and freshness of pork. …”
Get full text
Article -
1113
New Predictive Models for the Computation of Reinforced Concrete Columns Shear Strength
Published 2024-12-01“…The assessment methods for estimating the behavior of the complex mechanics of reinforced concrete (RC) structural elements were primarily based on experimental investigation, followed by the collective evaluation of experimental databases from the available literature. …”
Get full text
Article -
1114
A Comprehensive Review of Explainable Artificial Intelligence (XAI) in Computer Vision
Published 2025-07-01“…Explainable Artificial Intelligence (XAI) is increasingly important in computer vision, aiming to connect complex model outputs with human understanding. …”
Get full text
Article -
1115
Livestock Biometrics Identification Using Computer Vision Approaches: A Review
Published 2025-01-01“…This paper aims to comprehensively survey the techniques for individual livestock identification based on computer vision methods. It begins by elucidating the uniqueness of the primary biometric features of livestock, such as facial features, and their critical role in the recognition process. …”
Get full text
Article -
1116
Energy-Efficient Distributed Edge Computing to Assist Dense Internet of Things
Published 2025-01-01“…The proposed network depends on distributed edge computing at two levels: multiple access edge computing and fog computing. …”
Get full text
Article -
1117
Device-Driven Service Allocation in Mobile Edge Computing with Location Prediction
Published 2025-05-01“…With the rapid deployment of edge base stations and the widespread application of 5G technology, Mobile Edge Computing (MEC)has gradually transitioned from a theoretical concept to practical implementation, playing a key role in emerging human-machine interactions and innovative mobile applications. …”
Get full text
Article -
1118
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
Published 2025-04-01“…Federated learning combines with fog computing to transform data sharing into model sharing, which solves the issues of data isolation and privacy disclosure in fog computing. …”
Get full text
Article -
1119
Impact of contrast material on calcium burden by coronary computed tomography angiography
Published 2025-03-01“… Background: Coronary computed tomography angiography (CCTA) helps reveal complex coronary lesions and improves the success and complication rates of coronary interventions for the lesions. …”
Get full text
Article -
1120
Securing fog computing in healthcare with a zero-trust approach and blockchain
Published 2025-02-01“…Abstract As healthcare systems increasingly adopt fog computing to improve responsiveness and real-time data processing at the edge, significant security challenges emerge due to the decentralized architecture. …”
Get full text
Article