We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Programming Languages and Software

    Currently, there are a large, if not huge, number of high-level languages; however, when it comes to scientific and engineering computing, the choice...
    Berik I. Tuleuov, Ademi B. Ospanova in Beginning C++ Compilers
    Chapter 2024
  2. Compilers

    This chapter provides brief descriptions of the widely used compilers for C/C++ and Fortran and gives practical advice on working with them.
    Berik I. Tuleuov, Ademi B. Ospanova in Beginning C++ Compilers
    Chapter 2024
  3. FPGA-Based Hardware Accelerator for Matrix Inversion

    Matrix inversion is a computationally expensive operation in many scientific applications. Performing matrix inversion of rank deficient large order...

    Venkata Siva Kumar Kokkiligadda, Vijitha Naikoti, ... Rangababu Peesapati in SN Computer Science
    Article 09 January 2023
  4. An Integrative Architecture Language Approach

    This chapter is on one hand a survey on /Na 90/ and newer results. On the other, it summarizes the integrative nature of the approach to architecture...
    Manfred Nagl in Software Architectures
    Chapter 2024
  5. Prediction of Blood Glucose Levels in Patients with Type 1 Diabetes via LSTM Neural Networks

    Diabetes is one of the most prevalent diseases of the 21st century, with more than 500 million people affected. Having tools to estimate blood...
    Ciro Rodriguez Leon, Oresti Banos, ... Claudia Villalonga in Advances in Computational Intelligence
    Conference paper 2023
  6. Improved Herrmann-May’s Attack with Merging Variables and Lower LLL Bound

    Using side information to attack RSA is a practical method. In reality, it’s possible to intercept some bits of an unknown divisor p of a known...
    Qingfeng Cheng, Chunzhi Zhao, ... Fushan Wei in Information Security and Cryptology
    Conference paper 2024
  7. Brain tumor segmentation using extended Weiner and Laplacian lion optimization algorithm with fuzzy weighted k-mean embedding linear discriminant analysis

    This paper presents an efficient skull strip** method to improve the decision-making process. Extended Weiner filtering (EWF) is used for removing...

    Surbhi Vijh, Hari Mohan Pandey, Prashant Gaurav in Neural Computing and Applications
    Article 08 January 2022
  8. On the Usage of NLP on CVE Descriptions for Calculating Risk

    In order to conduct a risk analysis on an ecosystem the potential threats to its assets must first be identified. The Risk Modelling Tool (RMT) of...
    Thrasyvoulos Giannakopoulos, Konstantinos Maliatsos in Computer Security. ESORICS 2023 International Workshops
    Conference paper 2024
  9. Minimizing the Cost of Leveraging Influencers in Social Networks: IP and CP Approaches

    In this paper, we introduce and study mathematical programming formulations for the Least Cost Directed Perfect Awareness Problem (LDPAP), an NP-hard...
    Felipe de C. Pereira, Pedro J. de Rezende, Tallys Yunes in Integration of Constraint Programming, Artificial Intelligence, and Operations Research
    Conference paper 2024
  10. A secure and privacy-preserving data aggregation and classification model for smart grid

    Smart meters are rapidly installing by utility providers to improve the reliability and performance of Smart Grid. Utility providers analyze...

    Ashutosh Kumar Singh, Jatinder Kumar in Multimedia Tools and Applications
    Article 21 February 2023
  11. Forecasting the Temperature of BEV Battery Pack Based on Field Testing Data

    Monitoring electric vehicles’ battery situation and indicating the state of health is still challenging. Temperature is one of the critical factors...
    Ka Seng Chou, Kei Long Wong, ... Giovanni Pau in Edge Computing and IoT: Systems, Management and Security
    Conference paper 2023
  12. Forecasting COVID19 Reliability of the Countries by Using Non-Homogeneous Poisson Process Models

    Reliability is the probability that a system or a product fulfills its intended function without failure over a period of time and it is generally...

    Nevin Guler Dincer, Serdar Demir, Muhammet Oğuzhan Yalçin in New Generation Computing
    Article 03 July 2022
  13. A New Hybrid Cuckoo Quantum-Behavior Particle Swarm Optimization Algorithm and its Application in Muskingum Model

    Based on the Cuckoo Search Algorithm (CSA) and the Quantum-Behavior Particle Swarm Optimization (QPSO), this paper propose a hybrid cuckoo...

    **ongfa Mai, Han-Bin Liu, Li-Bin Liu in Neural Processing Letters
    Article 12 June 2023
  14. Moth flame algorithm-based optimization of a reduced switch multilevel inverter topology suitable for standalone application

    The escalating demand for sustainable and environmentally friendly energy sources has driven substantial growth in renewable energy adoption across...

    Ibrahim Haruna Shanono, Nor Rul Hasma Abdullah, ... Aisha Muhammad in Neural Computing and Applications
    Article 04 March 2024
  15. Overview of Core Technologies of Compilers

    Compilation technology is a huge subject, and we cannot fully explain it in a few chapters. However, the difficulty of compilers or compilation...
    HcySun Yang in Vue. JS Framework
    Chapter 2023
  16. General Land Use Cover Datasets for America and Asia

    In this chapter we review some examples of general Land Use Cover (LUC) map** at a supra-national level in America and Asia. These datasets provide...
    David García-Álvarez, Javier Lara Hinojosa in Land Use Cover Datasets and Validation Tools
    Chapter Open access 2022
  17. A systematic review on effective energy utilization management strategies in cloud data centers

    Data centers are becoming considerably more significant and energy-intensive due to the exponential growth of cloud computing. Cloud computing allows...

    Suraj Singh Panwar, M. M. S. Rauthan, Varun Barthwal in Journal of Cloud Computing
    Article Open access 17 December 2022
  18. Generating quality grasp rectangle using Pix2Pix GAN for intelligent robot gras**

    Intelligent robot gras** is a very challenging task due to its inherent complexity and non-availability of sufficient labeled data. Since making...

    Vandana Kushwaha, Priya Shukla, G. C. Nandi in Machine Vision and Applications
    Article 27 December 2022
  19. Brain magnetic resonance image (MRI) segmentation using multimodal optimization

    One of the highly focused areas in the medical science community is segmenting tumors from brain magnetic resonance imaging (MRI). The diagnosis of...

    Taymaz Akan, Amin Golzari Oskouei, ... Mohammad Alfrad Nobel Bhuiyan in Multimedia Tools and Applications
    Article Open access 02 July 2024
  20. Prediction of On-Road CO2 Emission in Urban Area Using State-of-The-Art Ensemble Machine Learning Model

    Transportation emissions, including carbon dioxide (CO2), nitrogen oxides (NOx), carbon monoxide (CO), and particulate matter (PM), are a significant...
    Navarajan Subramaniam, Norhakim Yusof in Advances in Geoinformatics Technologies
    Chapter 2024
Did you find what you were looking for? Share feedback.