„processor“
Suchergebnisse
10.000+ Treffer
-
A novel fine-grained intelligent framework for mitigating cyber-attacks through hybrid chaos-triggered tasmanian devil feature optimization and feedforward learning networks
-
RF-FedAvg: Federated learning-based random forest model for intrusion detection in wireless sensor networks
-
Improved Harris Hawk optimization for multilevel thresholding image segmentation
-
SS-DDPM: A novel denoising diffusion probabilistic model for industrial sensor signal data augmentation
-
SPATS: a practical system for comparative analysis of spatio-temporal graph neural networks
-
BIARO: an improved artificial rabbit optimization algorithm for feature selection in high-dimensional data
-
Research on inspection task allocation method of inspection robot based on improved genetic algorithm
-
Combating deepfakes: an entropy-aware framework for detecting forged visual and textual information
-
Computation offloading in the edge-to-cloud compute continuum: a survey of federated architectural solutions
-
Metaheuristics role in image processing and computer vision applications: a comprehensive review
-
A new design of an IoT-based industrial data management for smart manufacturing based on quantum circuits
-
L2AI: lightweight three-factor authentication and authorization in an IoMT blockchain-based environment with unsecure channel communication
-
A data sharing scheme for IoT devices based on blockchain and zk-SNARK
-
Volcano architecture for scalable quantum processor units
-
Leuk-XAI-EDL: explainable ensemble deep learning model for leukemia classification
-
Performance prediction and resource adaptive adjustment for cloud-native microservices
-
Federated blockchain and IPFS based secure interoperable healthcare system
-
A flight delay prediction model featuring a multi-strategy enhanced golf optimization algorithm integrated with LightGBM
-
Scheduling dependent-tasks over cloud-edge-end: a mutant Grey Wolf optimization approach with levy flight and random walk
-
RGCA: a reusable garbled circuit-based authentication for VANETs