Results 11 to 20 of about 132,284 (292)

From Scores to Predictions in Multi-Label Classification: Neural Thresholding Strategies

open access: yesApplied Sciences, 2023
In this paper, we propose a novel approach for obtaining predictions from per-class scores to improve the accuracy of multi-label classification systems.
Karol Draszawka, Julian Szymański
doaj   +1 more source

An Intelligent Scheduling of Non-Critical Patients Admission for Emergency Department

open access: yesIEEE Access, 2020
The combination of the progressive growth of an aging population, increased life expectancy and a greater number of chronic diseases all contribute significantly to the growing demand for emergency medical care, and thus, causing saturation in Emergency ...
Eva Bruballa   +3 more
doaj   +1 more source

QUANTIFYING THE QUALITY OF INDOOR MAPS [PDF]

open access: yesThe International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, 2019
Indoor maps are required for multiple applications, such as, navigation, building maintenance and robotics. One of common methods for map generation is laser scanning. In such maps, not only geometry of the map is of interest, but also its quality.
M. Assali   +5 more
doaj   +1 more source

Large computer systems and new architectures [PDF]

open access: yesComputer Physics Communications, 1982
Abstract A review from November 1978 of high speed computer architectures is presented using the specific examples of the TI ASC, Burroughs BSP, CDC STAR-100, CRI CRAY-1, ICL DAP and FPS AP-120B. The architectural design solutions adopted by these different computers are analysed in terms of memory size and bandwidth, vector processing style, scalar ...
openaire   +1 more source

H-RADIC: A Fault Tolerance Framework for Virtual Clusters on Multi-Cloud Environments

open access: yesJournal of Computer Science and Technology, 2018
Even though the cloud platform promises to be reliable, several availability incidents prove that it is not. How can we be sure that a parallel application finishes it´s execution even if a site is affected by a failure?
Ambrosio Royo   +4 more
doaj   +1 more source

A Real-Time Capable Dynamic Partial Reconfiguration System for an Application-Specific Soft-Core Processor

open access: yesInternational Journal of Reconfigurable Computing, 2019
Modern FPGAs (Field Programmable Gate Arrays) are becoming increasingly important when it comes to embedded system development. Within these FPGAs, soft-core processors are often used to solve a wide range of different tasks.
Michael Kirchhoff   +3 more
doaj   +1 more source

End-To-End Computer Vision Framework: An Open-Source Platform for Research and Education

open access: yesSensors, 2021
Computer Vision is a cross-research field with the main purpose of understanding the surrounding environment as closely as possible to human perception. The image processing systems is continuously growing and expanding into more complex systems, usually
Ciprian Orhei   +3 more
doaj   +1 more source

Applying Probability Theory for the Quality Assessment of a Wildfire Spread Prediction Framework Based on Genetic Algorithms

open access: yesThe Scientific World Journal, 2013
This work presents a framework for assessing how the existing constraints at the time of attending an ongoing forest fire affect simulation results, both in terms of quality (accuracy) obtained and the time needed to make a decision.
Andrés Cencerrado   +2 more
doaj   +1 more source

A Survey of Computer Architecture Simulation Techniques and Tools

open access: yesIEEE Access, 2019
Computer architecture simulators play an important role in advancing computer architecture research. With wider research directions and the increased number of simulators that have been developed, it becomes harder to choose a particular simulator to use.
Ayaz Akram, Lina Sawalha
doaj   +1 more source

Principle and method of deception systems synthesizing for malware and computer attacks detection

open access: yesРадіоелектронні і комп'ютерні системи, 2023
The number of different types and the actual number of malware and computer attacks is constantly increasing. Therefore, detecting and counteracting malware and computer attacks remains a pressing issue.
Antonina Kashtalian   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy