Traditional defect detection research is based on program analysis, and when dealing with large-scale programs, the detection speed is usually slow, resulting in limited detection performance. Moreover, because tradit...
详细信息
As new energy continues to become an important part of the power system, it constitutes a new type of power system with great progress and advantages in power generation and energy consumption. However, due to the unc...
详细信息
the stable operation of the power system is crucial for ensuring smooth social production. However, the regional photovoltaic power dispatching faces various challenges, including limited intelligence, unstable power ...
详细信息
Withthe prosperity of tourism-related industries and the wide application of computer technology and the Internet, the emergence and development of e-commerce tourism has a good social environment and technical suppo...
详细信息
there are various factors that associated withthe architecture of Multiple-Cloud Computing, which have negative impact that reduce the utilization of MCC. Our study is proposing a comprehensive taxonomy of these fact...
详细信息
ISBN:
(数字)9798331539771
ISBN:
(纸本)9798331539788
there are various factors that associated withthe architecture of Multiple-Cloud Computing, which have negative impact that reduce the utilization of MCC. Our study is proposing a comprehensive taxonomy of these factors. the proposed classification will help to apply efficient solutions/approaches that prevent, avoid, or reduce the negative impact of these factors; and enhance dealing withthese factors. this study identifies and categorize the factors into five primary dimensions: operational factors, data privacy and integrity factors, performance factors, and law and legislations factors.
this article used OpenCV (Open Source computer Vision Library) to preprocess images, and then used positioning methods and horizontal and vertical projection methods to accurately locate the key information to be reco...
详细信息
Comparing with neural network method to more known methods, this article assesses their simplicity and effectiveness. Our approach uses new network pruning, interpretability-based regularization, and gradient-based se...
详细信息
In the realm of education technology, the integration of biometric authentication has garnered significant attention for its potential to streamline and enhance traditional attendance management systems. this research...
详细信息
the integration of Artificial Intelligence (AI) into educational technologies marks a significant shift in learning methodologies and operational dynamics within educational institutions. At the forefront is an AI-dri...
详细信息
the narrowness of mine tunnels makes it difficult for vehicles from opposite directions to pass each other side by side. this paper lays its foundation on the information-based system of vehicle location and the voice...
详细信息
暂无评论