As people have higher requirements for object detection accuracy and adaptability, this research proposes a single-stage algorithm for thermal image target detection based on Yolo v4. the algorithm combines the visibl...
详细信息
Cloud data integrity verification was an important means to ensure data security. We used public key infrastructure (PKI) to manage user keys in Traditional way, but there were problems of certificate verification and...
详细信息
Non relational database is a very popular and popular database technology. It has the characteristics of large amount of data, high concurrency, strong reading and writing ability, flexible use, simple data structure ...
详细信息
Deep learning research in the area of recommender systems is still in its infancy. A recommendation system's primary goal is to establish connections between users and objects in order to recognize the products th...
详细信息
Current blood distribution systems lack a seamless structure and seem to be quite an ad hoc. these conventional systems are prone to errors due to poor blood management that claims many people’s lives. As we need to ...
详细信息
Cognitive complexity of a software determines the methodology of comprehending the internal logic of a given software by an individual, quantitatively. the procedure of handling a software by different users is differ...
详细信息
Nowadays cloud computing services are being extensively used for server hosting, data storage, processing, computing, and scientific and research purposes. So data centers are the substrate of any type of services in ...
详细信息
ISBN:
(纸本)9781538608043
Nowadays cloud computing services are being extensively used for server hosting, data storage, processing, computing, and scientific and research purposes. So data centers are the substrate of any type of services in cloud computing infrastructure. Virtualization technology provides the infrastructure of various virtual elements on similar substrate/physical infrastructure. Network virtualization process includes two steps of node mapping and link mapping that provides the substrate network for each virtual network and is referred to as Virtual Network Embedding (VNE). this paper proposes a new VNE algorithm called CaTa-VN that is substrate network topology-aware and do VNE steps in a coordinated way. We appraise and compare the proposed CaTa-VN algorithm with two other related works with random topology. Experimental results demonstrate that CaTa-VN algorithm increases revenue and acceptance ratio and decrease cost.
People are accustomed to shopping for items they require online these days. A person can connect their devices to the Internet, go to the store's website, and select the product they desire. this is where content ...
详细信息
ISBN:
(纸本)9781665494755
People are accustomed to shopping for items they require online these days. A person can connect their devices to the Internet, go to the store's website, and select the product they desire. this is where content marketing comes in. It's the process of attracting, engaging, and delighting your target markets. Kansei engineering is a consumer-oriented methodology for product development. It was defined as "the translating technology of a consumer's feeling (Kansei) and image for a product into the physical design elements". there are currently studies being conducted to evaluate Kansei's word to build a new product. the heart rate, on the other hand, has yet to be thoroughly investigated. therefore, we applied Kansei engineering concepts to experiment on Kansei word preferences to build content that focuses on attention and heart rate until a final decision is reached, as well as content marketing that meets the needs of the target consumers. We can estimate the relationship between people's feelings and their heart rate while seeing the content based on the results.
the cognitive complexity of a software determines the human comprehension effort to determine its underlying logic. the human comprehension effort preliminary depends on the person, who deals withthe software, the so...
详细信息
Withthe exponential increase in the number of mobile devices in the battlefield environment, UAV technology and edge computingtechnology have been widely used in battlefield command and communication processes. Base...
详细信息
ISBN:
(数字)9781665482233
ISBN:
(纸本)9781665482233
Withthe exponential increase in the number of mobile devices in the battlefield environment, UAV technology and edge computingtechnology have been widely used in battlefield command and communication processes. Based on this, this paper proposes a battlefield-oriented Flying ad-hoc networks based on mobile edge computing (FAN-MEC), and combines Software Defined Network (SDN) technology to optimize the network architecture. At the same time, this paper introduces the functional architecture and command architecture of the network, and finally introduces the related research on key technologies.
暂无评论