Results 31 to 40 of about 3,275,591 (372)

Feature Selection and Radial Basis Function Network for Parkinson Disease Classification

open access: yesKurdistan Journal of Applied Research, 2017
Recently, several works have focused on detection of a different disease using computational intelligence techniques. In this paper, we applied feature selection method and radial basis function neural network (RBFN) to classify the diagnosis of ...
Ashraf Osman Ibrahim   +3 more
doaj   +1 more source

Amplitude‐Controlled Electromagnetic Pulse Switching Using Waveguide Junctions for High‐Speed Computing Processes

open access: yesAdvanced Intelligent Systems, 2022
Performing computational tasks with wave‐based devices is becoming a groundbreaking paradigm that can open new opportunities for the next generation of efficient analogue/digital computing systems.
Ross Glyn MacDonald   +2 more
doaj   +1 more source

Open issues in organizing computer systems conferences [PDF]

open access: yesACM SIGCOMM Computer Communication Review, 2008
The Workshop on Organizing Workshops, Conferences, and Symposia for Computer Systems (WOWCS) was organized to "bring together conference organizers (past, present, and future) and other interested people to discuss the issues they confront." In conjunction with WOWCS, we survey some previous publications that discuss open issues related to organizing ...
Jeffrey C. Mogul, Tom Anderson
openaire   +1 more source

A Survey on Edge Computing Systems and Tools [PDF]

open access: yesProceedings of the IEEE, 2019
Driven by the visions of Internet of Things and 5G communications, the edge computing systems integrate computing, storage, and network resources at the edge of the network to provide computing infrastructure, enabling developers to quickly develop and ...
F. Liu   +5 more
semanticscholar   +1 more source

Mobile Computing and Cloud maturity - Introducing Machine Learning for ERP Configuration Automation [PDF]

open access: yesInformatică economică, 2013
Nowadays the smart phone market is clearly growing due to the new type of functionalities that mobile devices have and the role that they play in everyday life.
Elena Geanina ULARU   +4 more
doaj   +1 more source

Increased security through open source [PDF]

open access: yes, 2007
In this paper we discuss the impact of open source on both the security and transparency of a software system. We focus on the more technical aspects of this issue, combining and extending arguments developed over the years. We stress that our discussion
Anderson R.   +3 more
core   +6 more sources

Clouds of Small Things: Provisioning Infrastructure-as-a-Service from within Community Networks [PDF]

open access: yes, 2013
Community networks offer a shared communication infrastructure where communities of citizens build and own open networks. While the IP connectivity of the networking devices is successfully achieved, the number of services and applications available from
Khan, Amin M.   +3 more
core   +1 more source

Security Architecture for Cloud-Based Command and Control System in IoT Environment

open access: yesApplied Sciences, 2020
With the development of the fourth industrial technology, such as the Internet of Things (IoT) and cloud computing, developed countries including the U.S.
Jahoon Koo   +3 more
doaj   +1 more source

STORMSeq: an open-source, user-friendly pipeline for processing personal genomics data in the cloud. [PDF]

open access: yesPLoS ONE, 2014
The increasing public availability of personal complete genome sequencing data has ushered in an era of democratized genomics. However, read mapping and variant calling software is constantly improving and individuals with personal genomic data may ...
Konrad J Karczewski   +5 more
doaj   +1 more source

A New Approach to Analyzing Interactions of Two Objects in Space Based on a Specially- Tailored Local Coordinate System

open access: yesIEEE Access, 2021
Conventionally, geometric computing problems are treated as algebraic computing problems by representing a geometric object in a global reference coordinate system. This approach has two problems.
Haiyan Yu, Yuanjun He, Wenjun Zhang
doaj   +1 more source

Home - About - Disclaimer - Privacy