Showing 921 - 940 results of 28,739 for search '"computability"', query time: 0.10s Refine Results
  1. 921

    Measurements and Analytical Computer-Based Study of CMOS Inverters and Schmitt Triggers by Umesh Kumar

    Published 1996-01-01
    “…Complete detailed theoretical, experimental and computer based results are derived and exhibited.…”
    Get full text
    Article
  2. 922

    Integration in CNN and FIR filters for improved computational efficiency in signal processing by A. Sridevi, A. Sathiya

    Published 2025-01-01
    “…The incorporation of the Vedic multiplier into the CNN framework reveals the application of the proposed idea in the field of biomedical signal processing with improved computational speed and accuracy. The results corroborate the multiplier’s efficiency in decreasing the computational complexity and enhancing the possibility of real-time analysis of CNN-based systems in healthcare.…”
    Get full text
    Article
  3. 923

    TEACHING COMPUTATIONAL THINKING IN SAUDI ARABIAN SCHOOLS USING SMARTPHONE APPS by Abdullah Alenezi

    Published 2024-10-01
    Subjects: “…computational thinking…”
    Get full text
    Article
  4. 924
  5. 925

    On Computation and Analysis of Topological Index-Based Invariants for Complex Coronoid Systems by Muhammad Aamer Rashid, Sarfraz Ahmad, Muhammad Kamran Siddiqui, Mohammed K. A. Kaabar

    Published 2021-01-01
    “…Explicitly, this tremendous improvement has been outstanding in the field of soft computing, molecular biology, and information technology. …”
    Get full text
    Article
  6. 926
  7. 927
  8. 928

    Assessing bias and computational efficiency in vision transformers using early exits by Seth Nixon, Pietro Ruiu, Marinella Cadoni, Andrea Lagorio, Massimo Tistarelli

    Published 2025-01-01
    “…We present an approach using the state of the art Vision Transformer and Early Exits for reducing compute budget without significantly affecting performance. …”
    Get full text
    Article
  9. 929

    A simplified computational liver perfusion model, with applications to organ preservation by Daniel Emerson, Yoed Rabin, Levent Burak Kara

    Published 2025-01-01
    “…Additionally, we introduce the concept of a super lobule which enables a computational abstraction of biological liver lobules. …”
    Get full text
    Article
  10. 930
  11. 931
  12. 932
  13. 933

    Combinatorial and Multinomial Coefficients and its Computing Techniques for Machine Learning and Cybersecurity by Chinnaraji Annamalai

    Published 2022-09-01
    Subjects: “…algorithm, combinatorics, computation, multinomial coefficient…”
    Get full text
    Article
  14. 934

    Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment by Rongrui Yu, Chunqiong Wu, Bingwen Yan, Baoqin Yu, Xiukao Zhou, Yanliang Yu, Na Chen

    Published 2021-01-01
    “…Finally, based on the impact of cloud computing, mobile e-commerce is analyzed, including relevant theories, service mode, architecture, core technology, and the application in e-commerce, which can realize e-commerce precision marketing, find the optimal path of logistics, and take effective security measures to avoid transaction risks. …”
    Get full text
    Article
  15. 935

    Computer-Aided Modelling and Analysis of PV Systems: A Comparative Study by Charalambos Koukouvaos, Dionisis Kandris, Maria Samarakou

    Published 2014-01-01
    “…The work presented in this paper aims on a first level at the performance analysis of various configurations of photovoltaic systems through computer-aided modelling. On a second level, it provides a comparative evaluation of the credibility of two of the most advanced graphical programming environments, namely, Simulink and LabVIEW, with regard to their application in photovoltaic systems.…”
    Get full text
    Article
  16. 936
  17. 937

    Encrypted image retrieval in multi-key settings based on edge computing by Yingying LI, Jianfeng MA, Yinbin MIAO

    Published 2020-04-01
    “…Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy re-encryption technologies was proposed.The retrieval efficiency and accuracy were improved and the extra computational cost of query users was reduced.Security analysis shows that the basic scheme can only resist the known ciphertext attack,while the enhanced scheme can resist the known background attack.The experimental performance test based on the real-world dataset shows that the proposed schemes are feasible in practical application scenarios.…”
    Get full text
    Article
  18. 938

    Similarity Learning and Generalization with Limited Data: A Reservoir Computing Approach by Sanjukta Krishnagopal, Yiannis Aloimonos, Michelle Girvan

    Published 2018-01-01
    “…We present two Reservoir Computing architectures, which loosely resemble neural dynamics, and show that a Reservoir Computer (RC) trained to identify relationships between image pairs drawn from a subset of training classes generalizes the learned relationships to substantially different classes unseen during training. …”
    Get full text
    Article
  19. 939

    Usability of Computer-Aided Translation Software Based on Deep Learning Algorithms by Junjun Liu

    Published 2022-01-01
    “…In recent years, due to the development of computer technology and information technology, web technology has changed the mode of translation at an alarming rate. …”
    Get full text
    Article
  20. 940

    Perancangan Aplikasi Computer based Test (CBT) Psikotes Berbasis Website by Sistha Putri Hemawati, Hanna Prillysca Chernovita

    Published 2022-10-01
    “…Maka, perlu dibangun aplikasi Computer Based Test (CBT) psikotes. Aplikasi ini dapat diikuti oleh peserta umum maupun pelajar. …”
    Get full text
    Article