Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
10601
Adaptation Measurement of CAD/CAM Dental Crowns with X-Ray Micro-CT: Metrological Chain Standardization and 3D Gap Size Distribution
Published 2016-01-01“…X-ray micro-Computed Tomography (micro-CT) is a noninvasive imaging technique enabling the internal inspection of the assembly. …”
Get full text
Article -
10602
Application Assessment of OS-SART Reconstruction Algorithm with Limited Number of Projections in XCT Geometric Measurement
Published 2025-02-01“… In industrial X-ray Computed Tomography (XCT), two primary kinds of reconstruction algorithms are utilized: the Feldkamp-Davis-Kress (FDK) algorithm and the algebraic reconstruction technique (ART) algorithms. …”
Get full text
Article -
10603
Prediction and Aerodynamic Analysis of Interior Noise and Wind Drag Generated by the Outside Rear-View Mirror for Commercial Vehicles
Published 2020-01-01“…The acoustic field was then computed based on the information extracted from the CFD solver. …”
Get full text
Article -
10604
Model-Order Reduction of Multistage Cascaded Models for Digital Predistortion
Published 2025-01-01“…The trade-off among linearity, power efficiency and computational complexity is evaluated considering the linearization of a high-efficiency pseudo-Doherty load-modulated balanced amplifier (PD-LMBA). …”
Get full text
Article -
10605
Monitoring Moving Queries inside a Safe Region
Published 2014-01-01“…The safe region is one method that has been proposed to minimise the communication and computation cost of continuously monitoring a moving range query. …”
Get full text
Article -
10606
Investigation of mixed mode-I/II fracture problems - Part 2: evaluation and development of mixed mode-I/II fracture criteria
Published 2016-01-01“…In Part 1 of the study, results from numerical and experimental analyses are given. Having computed the mixed mode stress intensity factors from the numerical analyses, fracture loads are predicted and compared with different mixed mode-I/II fracture criteria. …”
Get full text
Article -
10607
Improved Low-Complexity Demodulation: Integrating Minimum-Mean-Square-Error and Maximum-Likelihood Detection for Image-Sensor-Based Visible Light Communication
Published 2025-01-01“…The traditional maximum likelihood detection (MLD)-based demodulation, although effective, incurs high computational costs, restricting its use in real-time applications. …”
Get full text
Article -
10608
Low-Complexity Transmit Antenna Selection and Beamforming for Large-Scale MIMO Communications
Published 2014-01-01“…It is shown that the required antenna selection processing time of the proposed method does not increase along with the increase of selected antennas, but the computation complexity of conventional exhaustive search method will significantly increase when large-scale antennas are employed in the system. …”
Get full text
Article -
10609
Deep Learning of Temperature – Dependent Stress – Strain Hardening Curves
Published 2023-05-01“…In addition, the model showed very high computational efficiency compared to FEA, allowing much faster prediction of the stress – strain curves at specific temperatures.…”
Get full text
Article -
10610
LADRC-MPC strategy for three-level UPQC
Published 2025-01-01“…The partitioning of the space voltage vector in model prediction is optimized to reduce the controller′s computational load, thereby improving computation speed while ensuring the quality of the output current. …”
Get full text
Article -
10611
Preserving data privacy in social recommendation
Published 2015-12-01“…Social recommendation is a method which requires the participants of both user’s historical behavior data and social network,which generally belong to different parties,such as recommendation system service provider and social network service provider.Considering the fact that in order to maintain the value of their own data interests and user’s privacy,none of them will provide data information to the other,two privacy preserving protocols are proposed for efficient computation of social recommendation which needs the cooperation of two parties (recommendation system service provider and social network service provider).Both protocols enable two parties to compute the social recommendation without revealing their private data to each other.The protocol based on the well-known oblivious transfer multiplication has a low cost,and is suitable for the application of high efficiency requirements.And the one based on homomorphic cryptosystem has a better privacy preserving,and is more suitable for the application of higher data privacy requirements.Experimental results on the four real datasets show those two protocols are efficient and practical.Users are suggested to choose the appropriate protocol according to their own need.…”
Get full text
Article -
10612
Proximal Femoral Morphology and the Relevance to Design of Anatomically Precontoured Plates: A Study of the Chinese Population
Published 2014-01-01“…Anthropometric data on the proximal femur were performed utilizing three-dimensional computational modeling. Computed tomography images of healthy femurs in 53 women and 47 men were contributed to three-dimensional femur modeling. …”
Get full text
Article -
10613
High-Bandwidth and Energy-Efficient Memory Interfaces for the Data-Centric Era: Recent Advances, Design Challenges, and Future Prospects
Published 2024-01-01“…Currently, we are living in a data-centric era as the need for large amounts of data has dramatically increased due to the widespread adoption of artificial intelligence (AI) in a variety of technology domains. In the current computing architecture, the memory input and output (I/O) bandwidth is becoming a bottleneck for improving computing performance; therefore, high-bandwidth memory interfaces are essential. …”
Get full text
Article -
10614
CausalXtract, a flexible pipeline to extract causal effects from live-cell time-lapse imaging data
Published 2025-01-01“…Hence, CausalXtract provides a unique computational tool to interpret live-cell imaging data for a range of fundamental and translational research applications.…”
Get full text
Article -
10615
Cybersecurity and Liability in a Big Data World
Published 2018-10-01“… The interplay between big data and cloud computing is at the same time undoubtedly promising, challenging and puzzling. …”
Get full text
Article -
10616
Some Aspects of Sensitivity Analysis in Variational Data Assimilation for Coupled Dynamical Systems
Published 2015-01-01“…However, the exploration of VDA requires considerable computational resources. For simple enough low-order models, the computational cost is minor and therefore models of this class are used as simple test instruments to emulate more complex systems. …”
Get full text
Article -
10617
CFD-Guided Development of Test Rigs for Studying Erosion and Large-Particle Damage of Thermal Barrier Coatings
Published 2011-01-01“…Application of CFD allows many of these iterations to be done computationally before hardware is built or modified, reducing overall testing costs and time, and it can provide an improved understanding of how these rigs operate. …”
Get full text
Article -
10618
Improved QRD-M Detection Algorithm for Generalized Spatial Modulation Scheme
Published 2017-01-01“…It will lead to imperfect detection performance with relatively high computational complexity by directly applying the original QR-decomposition with M algorithm (QRD-M) to the GSM scheme. …”
Get full text
Article -
10619
Quantitative Controllability Metric for Disturbance Rejection in Linear Unstable Systems
Published 2024-12-01“…Numerical examples demonstrated that the proposed metric maintained the physical meaning of the original DoDR while offering practical computational advantages. This study represents a significant step toward the efficient and reliable assessment of disturbance rejection capabilities in unstable systems.…”
Get full text
Article -
10620
On the Development of a Modified Timoshenko Beam Element for the Bending Analysis of Functionally Graded Beams
Published 2024-12-01“…Comparative results demonstrate high accuracy in computations, even with both regular and irregular meshes, as well as coarse and fine discretization. …”
Get full text
Article