Wireless Body Area Networks (WBANs) are an innovative technology that has been widely adopted in the healthcare field to continuously monitor a patient's vital signs and other health data. these networks consist o...
详细信息
VPIC is a multi-purpose plasma physics code extensively used in modeling phenomena such as inertial confinement fusion and laser-plasma instabilities. In past work, we targeted the portability of VPIC across heterogen...
详细信息
ISBN:
(纸本)9798350370621
VPIC is a multi-purpose plasma physics code extensively used in modeling phenomena such as inertial confinement fusion and laser-plasma instabilities. In past work, we targeted the portability of VPIC across heterogeneous resources while preserving performance by deploying Kokkos as the interface to those resources (VPIC 2.0). In this work, we emphasize the impact of tracing particles for studying the movement of particle subsets in large plasma systems. We augment the VPIC code with our particle tracer, including particle annotations for post-analysis of simulations. We apply optimizations to the augmented code, such as buffering and asynchronous execution, to reduce the I/O load when studying simulation data, allowing high-performance particle analyses. We use our particle tracer for rapid and targeted analysis of plasma composed of electrons and ions accelerated by a short laser pulse.
Cloud computing makes computers a utility and allows scientific, consumer, and corporate applications. this implementation raises energy, CO2, and economic problems. Cloud computing companies are concerned about energ...
详细信息
Withthe advancement and popularization of science and technology, much research explores the provision of health care services or health management withthe assistance of information technology in addition to traditi...
详细信息
the proceedings contain 24 papers. the special focus in this conference is on internationalconference on Man-Machine Interactions. the topics include: FIT2COMIn – Robust Clustering Algorithm for Incomplete Data;GrF...
ISBN:
(纸本)9783030319632
the proceedings contain 24 papers. the special focus in this conference is on internationalconference on Man-Machine Interactions. the topics include: FIT2COMIn – Robust Clustering Algorithm for Incomplete Data;GrFCM – Granular Clustering of Granular Data;evaluation of Cosine Similarity Feature for Named Entity Recognition on Tweets;deep Recurrent Neural Networks for Human Activity Recognition During Skiing;recognition of Tennis Shots Using Convolutional Neural Networks Based on three-Dimensional Data;on Unsupervised and Supervised Discretisation in Mining Stylometric Features;LCR-BLAST—A New Modification of BLAST to Search for Similar Low Complexity Regions in Protein Sequences;risk Susceptibility of Brain Tumor Classification to Adversarial Attacks;prediction of Drug Potency and Latent Relation Analysis in Precision Cancer Treatment;predictions of Age and Mood Based on Changes in Saccades Parameters;VEEP—the System for Motion Tracking in Virtual Reality;using Copula and Quantiles Evolution in Prediction of Multidimensional Distributions for Better Query Selectivity Estimation;Audio-Visual TV Broadcast Signal Segmentation;optimizing Training Data and Hyperparameters of Support Vector Machines Using a Memetic Algorithm;induction of Centre-Based Biclusters in Terms of Boolean Reasoning;issues on Performance of Reactive Programming in the Java Ecosystem with Persistent Data Sources;immersive Virtual Reality for Assisting in Inclusive Architectural Design;spatio-Temporal Filtering for Evoked Potentials Detection;a Review on the Vehicle to Vehicle and Vehicle to Infrastructure Communication;classifying Relation via Piecewise Convolutional Neural Networks with Transfer Learning;ensembles of Active Adaptive Incremental Classifiers;influence of the Applied Outlier Detection Methods on the Quality of Classification.
the digital advertising landscape is rapidly transforming amidst evolving privacy regulations such as GDPR and CCPA, steering away from reliance on cookies and personally identifiable information (PII) towards privacy...
详细信息
Organizations are heading towards a modernization journey. Cloud providers are playing a vital role in this journey. the industry is focused on cost efficiency and ROI since they need a huge investment for the moderni...
详细信息
the proceedings contain 139 papers. the topics discussed include: artificial level language: a library of computing engine for natural languages;fourth order sliding mode control of position for electro-hydraulic actu...
ISBN:
(纸本)9798350334128
the proceedings contain 139 papers. the topics discussed include: artificial level language: a library of computing engine for natural languages;fourth order sliding mode control of position for electro-hydraulic actuator;design of hexapod robot with adaptive gait transition on rough terrain;energy-efficient data aggregation schemes for low-power distributed wireless sensor networks using compressed sensing;adaptive neural attitude and altitude control of a quadrotor UAV with external disturbances via sliding mode control;an indigenous 32 bit pipelined processor for space applications;design of ins aided receiver integrity monitoring algorithm (ARIM) for GNSS integrated navigation systems;algebraic topology as an analytic tool to check lossless nature of geometric algorithms;implementing a land registration system using non-fungible tokens to represent land in the system and side-chain for data storage;a novel general purpose processing ASIC for inertial sensors;semi-autonomous non-singular terminal sliding mode control of a micro aerial robot for outdoor wall climbing operation;investigations on recent advancements in the fabrication of in-plane micro-supercapacitors as portable energy storage devices;Reswave-Net: a wavelet based residual U-Net for brain tumor segmentation and overall survival prediction;and bidirectional voltage level shifter with configurable voltage range.
High-value assets are prime targets for theft. Mitigating the losses associated with such theft requires swift detection, accurate identification, and real-time response. this research proposes an anti-theft system em...
详细信息
New methods are needed to keep up withthe fast growth of Industry 5.0 when UAVs are added to 6G networks. this study talks about new ways to make tracking, communication, security, resource sharing, and finding probl...
详细信息
暂无评论