Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
10621
Anonymous whistleblowers reply scheme based on secret sharing
Published 2024-12-01“…The experimental results show that compared to the Express scheme, the proposed scheme reduces the computational complexity during a reply to <italic>O</italic>(1) from <italic>O</italic>(log<italic>N</italic>), resulting in a 60% reduction in computational overhead for the receiving organization and a 50% reduction for the server.…”
Get full text
Article -
10622
Application of New Technology of Intelligent Robot Plant Protection in Ecological Agriculture
Published 2022-01-01“…Compared with the traditional algorithm, the algorithm has higher accuracy, less computing time, and higher computing efficiency.…”
Get full text
Article -
10623
DBnet: A Lightweight Dual-Backbone Target Detection Model Based on Side-Scan Sonar Images
Published 2025-01-01“…Due to the large number of parameters and high computational complexity of current target detection models, it is challenging to perform fast and accurate target detection in side-scan sonar images under the existing technical conditions, especially in environments with limited computational resources. …”
Get full text
Article -
10624
Analysis of the Frost-Induced Damage of Building Enclosures on the Territory of the Czech Republic
Published 2018-01-01“…The exterior boundary conditions of the computational model are defined by a set of weather data characterizing the environmental conditions in the Czech Republic, which are acquired from 64 weather stations. …”
Get full text
Article -
10625
Security and Market Liquidity Enhanced Transactive Energy System for Residential End Users
Published 2025-01-01“…The swift progress of economically viable sustainable energy resources, coupled with advancements in communication and computational technologies, has facilitated the introduction of the Transactive Energy System (TES) within the smart grid. …”
Get full text
Article -
10626
Toward satellite-terrestrial integration: 6G cloud-fog collaborative self-organizing network
Published 2024-03-01“…However, LEO satellite networks are constrained by bottlenecks such as inadequate signal processing and computing capabilities of individual LEO satellites and constrained inter-satellite link capacity, necessitating a deep integration with terrestrial mobile communication networks that include extensive cloud-based processing and computing capabilities. …”
Get full text
Article -
10627
A TensorFlow implementation of Local Binary Patterns Transform
Published 2021-06-01“…Direct implementations of such layers in Python may result in long running times, and training a computer vision model may be delayed significantly. …”
Get full text
Article -
10628
Very large scale integration implementation of seizure detection system with on‐chip support vector machine classifier
Published 2022-01-01“…The polyphase architecture of Daubechies fourth‐order wavelet three‐level DWT was used to minimize computational time. The systolic array architecture‐based support vector machine classifier using parallel processing helps to minimize the computational complexity of the proposed method. …”
Get full text
Article -
10629
Brock's approaching zero method improved as approaching fixed point frequency to solve optimum damping ratio of dynamic vibration absorber in machine tools and experimental confirm...
Published 2024-01-01“…The fixed point theory essentially computes the extreme large value, not the maximum value. …”
Get full text
Article -
10630
Radiation Impact of the Halloween GLE Events During the October–November 2003 Period
Published 2025-01-01“…Using a conservative approach, the computed total effective dose for all three Halloween GLEs was 135 μSv in polar regions, an increase of 129% above the galactic cosmic ray background induced dose. …”
Get full text
Article -
10631
Interaction Design of Educational App Based on Collaborative Filtering Recommendation
Published 2022-01-01“…Due to the operational characteristics of gesture interaction in the interface of a smart terminal application (app), this mode of human-computer interaction has become the mainstream mode of human-computer interaction. …”
Get full text
Article -
10632
Numerical Investigation of Critical Velocity in Reduced Scale Tunnel Fire with Constant Heat Release Rate
Published 2017-01-01“…It is indicated that, after several computations of full-scale fires of 43.103 and 19.103 kJ/kg as heat release rate, the velocities satisfying the criterion of healthy environment in the upstream side of the tunnel are 1.34 m/s and 1.12 m/s, respectively.…”
Get full text
Article -
10633
Very high cycle fatigue strength and crack growth of thin steel sheets
Published 2016-03-01“…To do that, special designs of specimens were made and computed using FEM for defining the stress amplitude for endurance tests. …”
Get full text
Article -
10634
Privacy-preserving real-time road conditions monitoring scheme based on intelligent traffic
Published 2020-07-01“…To alleviate the traffic pressure on roads,reduce the appearance of road congestion,and avoid the occurrence of traffic accidents,a privacy-preserving intelligent monitoring (PPIM) scheme based on intelligent traffic was proposed in combination with the safe and k-nearest neighbor (KNN) algorithm.To ensure the security of traffic data,the data content was randomly divided into independent parts via the secure multi-party computing strategy,and the data components were stored and encrypted separately by non-colluding multi-servers.To improve the accuracy of road condition monitoring,an improved KNN traffic monitoring algorithm was proposed.By virtue of the similarity calculation of data,the correlation value to measure the degree of traffic condition relationship between roads was obtained.And it was integrated with the KNN as the weight coefficient.To speed up the processing of dense data,a series of data security computing protocols were designed,and the data security processing was realized.In addition,real traffic data were used to verify the algorithm.The results show that the improved KNN algorithm is helpful to improve the accuracy of traffic monitoring.The analysis shows that the algorithm can not only guarantee the safety of data but improve the accuracy of traffic monitoring.…”
Get full text
Article -
10635
New Bouguer Gravity Maps of Venezuela: Representation and Analysis of Free-Air and Bouguer Anomalies with Emphasis on Spectral Analyses and Elastic Thickness
Published 2012-01-01“…A regional gravity map was computed by removing wavelengths higher than 200 km from the Bouguer anomaly. …”
Get full text
Article -
10636
Time-series single-cell transcriptomic profiling of luteal-phase endometrium uncovers dynamic characteristics and its dysregulation in recurrent implantation failures
Published 2025-01-01“…The holistic characterization of the physiological and pathophysiological window of implantation and a computational tool trained on this temporal atlas provide a platform for future therapeutic developments.…”
Get full text
Article -
10637
Cleaning Schedule Optimization of Heat Exchangers with Fouling on Tube and Shell Sides: A Metaheuristic Approach
Published 2024-12-01“…Current methods for optimizing cleaning schedules often report high computation times due to the transient nature of the fouling process and do not consider shell-side fouling, which can be significant for some oil fractions. …”
Get full text
Article -
10638
Dense Sandstone Material Decomposition Based on Improved Convolutional Neural Network
Published 2025-01-01“…Energy spectrum computed tomography can provide quantitative information of scanned objects and realize material decomposition. …”
Get full text
Article -
10639
Innovative IaaS Management System for Sensor Devices and IT Resources
Published 2014-06-01“…The evaluation results of SC show that the transmission delay for sensor data between the sensor devices and the users in SC was decreased by up to 81% compared to a typical cloud computing implementation.…”
Get full text
Article -
10640
Efficient data possession–checking protocol with deduplication in cloud
Published 2017-08-01“…In fact, these operations bring a lot of computational costs. To solve this problem, we propose a data integrity verification scheme with deduplication. …”
Get full text
Article