Results 131 to 140 of about 1,628,666 (344)

PARALLEL, SPACE-EFFICIENT HASH TABLE RESIZE [PDF]

open access: yes, 2015
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for parallel, space-efficient hash table resize. An aspect may include a hash table that may be resized by incrementally de-allocating buckets of an old ...
Lebar, Justin, Pike, Geoffrey
core   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

Longest-First Search Using Bloom Filter: Algorithm and FPGA Implementation

open access: yesIEEE Access
Due to the surge in Internet traffic and the rapid increase in forwarding table entries, achieving wire-speed packet forwarding in Internet routers demands both algorithmic enhancements and hardware innovations.
Jinsol Lee, Hyesook Lim
doaj   +1 more source

Bat algorithm based on kinetic adaptation and elite communication for engineering problems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Bat algorithm, a metaheuristic optimization technique inspired by the foraging behaviour of bats, has been employed to tackle optimization problems. Known for its ease of implementation, parameter tunability, and strong global search capabilities, this algorithm finds application across diverse optimization problem domains. However, in the
Chong Yuan   +6 more
wiley   +1 more source

Stealth distributed hash table [PDF]

open access: green, 2006
Andrew Brampton   +4 more
openalex   +1 more source

Toward a dynamically balanced cluster oriented DHT [PDF]

open access: yes, 2004
In this paper, we present a model for a cluster oriented Distributed Hash Table (DHT). It introduces software nodes, virtual nodes and partitions as high level entities that, in conjunction with the definition of a certain number of in variants, provide ...
Alves, Albano   +3 more
core  

A Lightweight YOLOv5 Target Detection Model and Its Application to the Measurement of 100‐Kernel Weight of Corn Seeds

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT The 100‐kernel weight of corn seed is a crucial metric for assessing corn quality, and the current measurement means mostly involve manual counting of kernels followed by weighing on a balance, which is labour‐intensive and time‐consuming. Aiming to address the problem of low efficiency in measuring the 100‐kernel weight of corn seeds, this ...
Helong Yu   +4 more
wiley   +1 more source

Multi-stage hashing network storage structure for intelligent routing

open access: yesDianxin kexue, 2020
Network data collection and storage are fundamental for intelligent routing control,providing massive flow data for model training and decision-making.However,as the key device in network storage system,switches have very limited memory size and design ...
Feng ZHU, Qun HUANG
doaj   +2 more sources

Home - About - Disclaimer - Privacy