Zobrazeno 1 - 10
of 4 764
pro vyhledávání: '"Systolic array"'
Autor:
Madhurima, V.1 Madhurima.v@svcolleges.edu.in, Padmapriya, K.1
Publikováno v:
Ingénierie des Systèmes d'Information. Apr2022, Vol. 27 Issue 2, p193-204. 12p.
Autor:
Iraj Moghaddasi, Byeong-Gyu Nam
Publikováno v:
Machine Learning and Knowledge Extraction, Vol 6, Iss 3, Pp 1484-1493 (2024)
In recent years, deep neural networks (DNNs) have addressed new applications with intelligent autonomy, often achieving higher accuracy than human experts. This capability comes at the expense of the ever-increasing complexity of emerging DNNs, causi
Externí odkaz:
https://doaj.org/article/2ee3adbb86c845e6b391cab1e91cd59b
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 8, Pp 102194- (2024)
In this era of Transformers enjoying remarkable success, Convolutional Neural Networks (CNNs) remain highly relevant and useful. Indeed, hybrid Transformer-CNN network architectures, which combine the benefits of both approaches, have achieved impres
Externí odkaz:
https://doaj.org/article/bab0bfefdc0b44e792790747267d0574
Autor:
Rene Miedema, Christos Strydis
Publikováno v:
Frontiers in Neuroinformatics, Vol 18 (2024)
IntroductionIn-silico simulations are a powerful tool in modern neuroscience for enhancing our understanding of complex brain systems at various physiological levels. To model biologically realistic and detailed systems, an ideal simulation platform
Externí odkaz:
https://doaj.org/article/91cf1a4c41084e51b2cc69acfa6f8751
Autor:
Mukherjee, Debasish1 debasish0004@cse.ism.ac.in, Mukhopadhyay, Susanta1 msushanta2001@gmail.com, Biswas, G.1 gpbiswas@gmail.com
Publikováno v:
Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ). Aug2017, Vol. 42 Issue 8, p3191-3206. 16p.
Autor:
Atef Ibrahim, Fayez Gebali
Publikováno v:
Symmetry, Vol 16, Iss 6, p 715 (2024)
In today’s TEST interconnected world, the security of 5G Medical IoT networks is of paramount concern. The increasing number of connected devices and the transmission of vast amounts of data necessitate robust measures to protect information integr
Externí odkaz:
https://doaj.org/article/851a9c123612463a9762f46cce7c38df
Autor:
Jiyoung Park1, Yeon A Kim2, Jeong Yeol Han3, Sangkyu Jin1, Seong-Ho Ok1,4, Ju-Tae Sohn1,4, Heon-Keun Lee1,4, Young-Kyun Chung1,4, Il-Woo Shin1,4 ilwooshin@gnu.ac.kr
Publikováno v:
Korean Journal of Anesthesiology. Feb2016, Vol. 69 Issue 1, p57-62. 6p.
Autor:
Atef Ibrahim, Fayez Gebali
Publikováno v:
Applied Sciences, Vol 14, Iss 10, p 4085 (2024)
Security and privacy concerns pose significant obstacles to the widespread adoption of IoT technology. One potential solution to address these concerns is the implementation of cryptographic protocols on resource-constrained IoT edge nodes. However,
Externí odkaz:
https://doaj.org/article/0c55be5b3581402fb61c7f027c67d9bc
Autor:
O'Leary, Dianne P., Stewart, G.W.
Publikováno v:
Communications of the ACM. Aug1985, Vol. 28 Issue 8, p840-853. 14p. 24 Charts.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.