Search

Showing total 89 results
89 results

Search Results

1. Dynamic Monitoring of Football Training Based on Optimization of Computer Intelligent Algorithm.

2. Research on Network Oral English Teaching System Based on Machine Learning.

3. Three-Dimensional Reconstruction and Protection of Mining Heritage Based on Lidar Remote Sensing and Deep Learning.

4. An Improved Oil Painting Formation Using Advanced Image Processing.

5. The Protection and Restoration of Ancient Buildings in Guanzhong Traditional Villages Based on the Improved Priority Algorithm.

6. Interior Space Design and Automatic Layout Method Based on CNN.

7. Embedded Design of 3D Image Intelligent Display System Based on Virtual Reality Technology.

8. Analysis of the 3D Application Evaluation System of Landscape Based on Hybrid Cooperation of VR and AI.

9. Scaling non-regular shared-memory codes by reusing custom loop schedules.

10. Research on Monitoring Method of Remote Deformation and System Application Based on Image.

11. An Efficient Method for Choosing Digital Cluster Size in Ultralow Latency Networks

13. A Multiple-Fault Localization Method for Embedded Software with Applications in Engineering

14. A Node Location Method in Wireless Sensor Networks Based on a Hybrid Optimization Algorithm

16. Semantic Analysis of Literary Vocabulary Based on Microsystem and Computer Aided Deep Research

17. Applying Code Transform Model to Newly Generated Program for Improving Execution Performance

18. Design and Implementation of Nanotechnology QCA Geometric Greedy Router

19. The Basic Principles of Marxism with the Internet as a Carrier.

20. Algorithmic Mechanism Design of Evolutionary Computation.

21. Interdomain Identity-Based Key Agreement Schemes.

22. Automatic Modulation Classification Based on Deep Learning for Software-Defined Radio

23. Crypto-Stego-Real-Time (CSRT) System for Secure Reversible Data Hiding

24. LIRT: A Lightweight Scheme for Indistinguishability, Reachability, and Timeliness in Wireless Sensor Control Networks.

25. On the Anonymity of Identity-Based Encryption.

26. A Novel Two-Terminal Reliability Analysis for MANET.

27. Analysis and Improvement on a Unimodal Haptic PIN-Entry Method

28. Discussion on Teaching Method of Digital Image Processing Technology Based on PBL.

29. Computation of Polynomial Degree-Based Topological Descriptors of Indu-Bala Product of Two Paths.

30. An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer

31. A Note on the Drazin Indices of Square Matrices.

32. A Bit String Content Aware Chunking Strategy for Reduced CPU Energy on Cloud Storage

33. Transmit Beamforming Optimization Design for Broadband Multigroup Multicast System

34. Enhancing Parasitic Interference Directional Antennas with Multiple Director Elements.

35. Adaptive Phase Rolling for Opportunistic Beamforming in OFDMA Systems with a Small Number of Users

36. Two-Stage Precoding Based on Overlapping User Grouping Approach in IoT-Oriented 5G MU-MIMO Systems

37. Complexity of Deep Convolutional Neural Networks in Mobile Computing

38. Development of Multiobjective High-Level Synthesis for FPGAs

39. Timing Analysis and Optimization for DSM IC—Guest Editorial

40. Tradeoff of Computation Bits and Computing Speed in an Edge Computing System for Sensor Networks

41. Secure and Efficient Image Transmission Scheme for Smart Cities Using Sparse Signal Transformation and Parallel Compressive Sensing

42. A Noise-Tolerant Audio Encryption Framework Designed by the Application of S8 Symmetric Group and Chaotic Systems

43. Efficient Processing of Image Processing Applications on CPU/GPU

44. Analysis of Digital Image Watermarking Techniques through Hybrid Methods

45. Efficient Encryption System for Numerical Image Safe Transmission

46. Hybrid Consensus Algorithm Optimization: A Mathematical Method Based on POS and PBFT and Its Application in Blockchain

47. Modelling the Embedded Control System Using iUML-B Pattern State Machine

48. DWT versus WP Based Optical Color Image Encryption Robust to Composite Attacks

49. Error Detection and Correction On-Board Nanosatellites Using Hamming Codes

50. The Impact of Pixel Resolution, Integration Scale, Preprocessing, and Feature Normalization on Texture Analysis for Mass Classification in Mammograms