Suggested Topics within your search.
Suggested Topics within your search.
- Application software 2
- Computer-assisted instruction 2
- Education, Elementary 2
- Educational technology 2
- Internet in education 2
- Advertising media planning 1
- Anesthetics 1
- Digital techniques 1
- Graphical user interfaces (Computer systems) 1
- Hospitality industry 1
- Information technology 1
- Internet marketing 1
- Management 1
- Marketing 1
- Marketing channels 1
- Mass media and business 1
- Pharmacology 1
- Tourism 1
- Visual communication 1
- Visual programming (Computer science) 1
-
1181
TU-DAT: A Computer Vision Dataset on Road Traffic Anomalies
Published 2025-05-01“…This paper introduces TU-DAT, a novel, freely downloadable computer vision dataset for analyzing traffic accidents using roadside cameras. …”
Get full text
Article -
1182
Advantages of two quantum programming platforms in quantum computing and quantum chemistry
Published 2025-05-01“…We delve into their basic and advanced usage, examine their learning curves, and evaluate their capabilities in quantum computing experiments. …”
Get full text
Article -
1183
Task offloading and resource allocation for blockchain‐enabled mobile edge computing
Published 2024-12-01“…Abstract Mobile edge computing (MEC) has risen as an effective approach to support ubiquitous and prosperous mobile applications. …”
Get full text
Article -
1184
Empowering drones in vehicular network through fog computing and blockchain technology.
Published 2025-01-01“…Fog nodes strategically placed near IoT devices serve as computational resources for drones, ensuring quick service responses for deadline-driven tasks. …”
Get full text
Article -
1185
PCR and Bio-signature for data confidentiality and integrity in mobile cloud computing
Published 2021-05-01“…Cloud computing technology got relevance as computing paradigm, which delivers massively scalable computing technologies based on the Internet for the organizations. …”
Get full text
Article -
1186
Reducing Unnecessary Brain Computed Tomography Scan in a Tertiary Center
Published 2021-01-01“…Brain Computed Tomography (CT) is routinely requested before Lumbar Puncture (LP) to rule out increased intracranial pressure. …”
Get full text
Article -
1187
Comparative study of IoT- and AI-based computing disease detection approaches
Published 2025-03-01“…This study evaluated different machine learning and deep learning algorithms and their hybrid and optimized algorithms for IoT-based disease detection, using the most recent papers on IoT-based disease detection systems that include computing approaches, such as cloud, edge, and fog. …”
Get full text
Article -
1188
A computer-vision-based system for at-home rheumatoid arthritis rehabilitation
Published 2019-09-01Get full text
Article -
1189
Task Offloading Optimization Using PSO in Fog Computing for the Internet of Drones
Published 2024-12-01“…This particularity makes it difficult to apply the conventional task offloading technologies, such as cloud computing and edge computing, in IoD environments. …”
Get full text
Article -
1190
Computer-Controlled Local Anaesthesia Delivery efficacy − a literature review
Published 2024-08-01“…One of them is using the Computer-Controlled Local Anaesthesia Delivery systems (CCLADs). …”
Get full text
Article -
1191
Elicitation of Nonfunctional Requirements in Agile Development Using Cloud Computing Environment
Published 2020-01-01“…The methodology is evaluated by applying on eProcurement dataset. The results are improved by 8.77% and 1.76% in terms of “Successful” NFR. …”
Get full text
Article -
1192
Analysis of performance indicators of computer systems software on objects of special importance
Published 2023-08-01“…To achieve this goal, such methods as system analysis, computational and expert statistical are used.Result. …”
Get full text
Article -
1193
Incentive Mechanism for Cloud Service Offloading in Edge–Cloud Computing Environment
Published 2025-05-01“…Edge computing refers to provision storage and computation resources at the network edge, closer to end users than the remote cloud. …”
Get full text
Article -
1194
High-performance computing for static security assessment of large power systems
Published 2023-12-01“…We perform extensive experiments to evaluate the efficacy of the proposed algorithm. As a result, we establish that the proposed parallel algorithm with high-performance computing (HPC) computing is much faster than the traditional algorithms. …”
Get full text
Article -
1195
A High-Order Fractional Parallel Scheme for Efficient Eigenvalue Computation
Published 2025-05-01“…The method is implemented within a parallel computing framework, allowing simultaneous computations across multiple processors to improve both efficiency and reliability. …”
Get full text
Article -
1196
Imaging cells and nanoparticles using modulated optically computed phase microscopy
Published 2025-01-01“…To overcome the tradeoff, we develop a technology termed as modulated optically computed phase microscopy (M-OCPM) based on low coherence interferometry and optical computation. …”
Get full text
Article -
1197
Computed Tomographic Findings of Eosinophilic Enteritis in Eight Cats: Case Series
Published 2025-05-01“…Gastrointestinal eosinophilic sclerosing fibroplasia is a unique fibroblastic response of EE. Contrast‐enhanced computed tomography (CT) facilitates the objective characterisation of intestinal lesions and associated pathology. …”
Get full text
Article -
1198
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
1199
On achievements and contradictions in the development of computer technology in the USSR in the second half of the 1950s
Published 2024-05-01“…As arguments that the leadership of the country was able to evaluate, data on the situation in the United States in this area were given. …”
Get full text
Article -
1200
Simulation Conditions to Compute the Dispersion Diagram of 3D Periodic Structures
Published 2024-01-01“…In this work, we examine the methodology for numerically computing the dispersion diagram of three-dimensional periodic structures using commercial electromagnetic simulators. …”
Get full text
Article