Results 101 to 110 of about 76,576 (286)

All‐sky assimilation impacts of the Tomorrow.io microwave sounder constellation on global weather forecasts

open access: yesQuarterly Journal of the Royal Meteorological Society, EarlyView.
Key Findings: An assimilation methodology is established for the Tomorrow.io microwave sounder (TMS) flying on CubeSats in sun‐synchronous and inclined orbits, and in all cloud scenes. The TMS has a significant impact on weather forecast lead times up to 3 days in the Tropics in a research‐quality numerical weather prediction setting, and yields water ...
Jonathan J. Guerrette   +3 more
wiley   +1 more source

Improvements in Hardware Transactional Memory for GPU Architectures [PDF]

open access: yes, 2016
In the multi-core CPU world, transactional memory (TM)has emerged as an alternative to lock-based programming for thread synchronization. Recent research proposes the use of TM in GPU architectures, where a high number of computing threads, organized in ...
Asenjo-Plaza, Rafael   +3 more
core  

Why Autonomous Vehicles Are Not Ready Yet: A Multi‐Disciplinary Review of Problems, Attempted Solutions, and Future Directions

open access: yesJournal of Field Robotics, EarlyView.
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong   +13 more
wiley   +1 more source

Big Data Management: What to Keep from the Past to Face Future Challenges?

open access: yesData Science and Engineering, 2017
The emergence of new hardware architectures, and the continuous production of data open new challenges for data management. It is no longer pertinent to reason with respect to a predefined set of resources (i.e., computing, storage and main memory ...
G. Vargas-Solar   +2 more
doaj   +1 more source

Persistent Memory Transactions

open access: yes, 2018
This paper presents a comprehensive analysis of performance trade offs between implementation choices for transaction runtime systems on persistent memory. We compare three implementations of transaction runtimes: undo logging, redo logging, and copy-on-write. We also present a memory allocator that plugs into these runtimes.
Marathe, Virendra   +10 more
openaire   +2 more sources

Generative AI—the Transgression of Technology

open access: yesSystems Research and Behavioral Science, EarlyView.
ABSTRACT This article offers a systems‐theoretical analysis of generative artificial intelligence (GenAI) grounded in Niklas Luhmann's sociology of technology. It addresses a central conceptual problem: How GenAI can be understood within a theoretical framework that has traditionally defined technology as a means of stabilising action through causal ...
Jesper Tække
wiley   +1 more source

Linguistic Variation across Instructional Segments in International Teaching Assistants' Discourse: A Corpus‐Based Analysis

open access: yesTESOL Quarterly, EarlyView.
Abstract This study investigates internal linguistic variation in the instructional discourse of international teaching assistants (ITAs) by segmenting their mini‐lecture performances into four discourse types: introduction, lecture, conclusion, and audience interaction.
Heesun Chang, Hector Rivera
wiley   +1 more source

Efficient Discovery of Association Rules in E-Commerce: Comparing Candidate Generation and Pattern Growth Techniques

open access: yesApplied Sciences
Association rule mining plays a critical role in uncovering item correlations and hidden patterns within transactional data, particularly in e-commerce environments.
Ioan Daniel Hunyadi   +2 more
doaj   +1 more source

Data privacy model using blockchain reinforcement federated learning approach for scalable internet of medical things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Internet of Medical Things (IoMT) has typical advancements in the healthcare sector with rapid potential proof for decentralised communication systems that have been applied for collecting and monitoring COVID‐19 patient data. Machine Learning algorithms typically use the risk score of each patient based on risk factors, which could help ...
Chandramohan Dhasaratha   +9 more
wiley   +1 more source

ADVANCED FRAUD DETECTION IN CARD-BASED FINANCIAL SYSTEMS USING A BIDIRECTIONAL LSTM-GRU ENSEMBLE MODEL

open access: yesApplied Computer Science
This article addresses the challenges of fraud in card-based financial systems and proposes effective detection and prevention strategies. By leveraging recent data analytics and real-time monitoring, the study aims to enhance transaction security and ...
Toufik GHRIB   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy