Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
10961
Zero-One Law for Connectivity in Superposition of Random Key Graphs on Random Geometric Graphs
Published 2015-01-01Get full text
Article -
10962
Unicity of Meromorphic Solutions of the Pielou Logistic Equation
Published 2020-01-01Get full text
Article -
10963
The Asymptotic Synchronization Analysis for Two Kinds of Complex Dynamical Networks
Published 2012-01-01Get full text
Article -
10964
-
10965
Ethical use of ChatGPT in education—Best practices to combat AI-induced plagiarism
Published 2025-01-01Get full text
Article -
10966
-
10967
BDC-DAL: A new algorithm using blueprint difference convolution and dual auxiliary supervision for lightweight face anti-spoofing(BDC-DAL:基于蓝图差分卷积和双重辅助监督的轻量化人脸活体检测算法)...
Published 2025-01-01“…Most current face anti-spoofing methods employ deep convolutional neural networks, and although these systems can provide excellent detection performance, they often involve large number of parameters and computational complexity, which limits their application on resource-limited devices. …”
Get full text
Article -
10968
Human and Machine: A View through Kant's Use of Regulative Reason
Published 2024-12-01“…We justify this claim through the problem of “narrowing the brute search space” in computational complexity, which is a significant issue in computer science. …”
Get full text
Article -
10969
A Case of Successful Ablation of a Gastrophrenic Fistula with n-Butyl-2-Cyanoacrylate
Published 2008-01-01“…Clinical presentation, treatment progress and imaging findings by computed tomography scan, ultrasound, gastroscopy and fluoroscopy are presented, along with a brief review of the relevant literature.…”
Get full text
Article -
10970
Review of Intelligent Routing Technology in Integrated Satellite-Ground Network
Published 2021-06-01“…In view of the complex routing problems faced by the integrated satellite-ground network, the research progress of softwaredefi ned integrated satellite-ground network and intelligent routing was investigated.The training and deployment schemes of on-orbit routing mechanisms based on deep reinforcement learning were discussed, and a specifi c analysis was made in conjunction with the space intelligent computing platform.…”
Get full text
Article -
10971
Convergence of Numerical Solution of Generalized Theodorsen’s Nonlinear Integral Equation
Published 2014-01-01“…This equation arises in computing the conformal mapping between simply connected regions. …”
Get full text
Article -
10972
A Novel Approach to Calculation of Reproducing Kernel on Infinite Interval and Applications to Boundary Value Problems
Published 2013-01-01“…A new analytical method for the computation of reproducing kernel is proposed and tested on some examples. …”
Get full text
Article -
10973
Lump and Lump-Type Solutions of the Generalized (3+1)-Dimensional Variable-Coefficient B-Type Kadomtsev-Petviashvili Equation
Published 2019-01-01“…Based on the Hirota bilinear form of the generalized (3+1)-dimensional variable-coefficient B-type Kadomtsev-Petviashvili equation, the lump and lump-type solutions are generated through symbolic computation, whose analyticity can be easily achieved by taking special choices of the involved parameters. …”
Get full text
Article -
10974
Similarity Solutions of Partial Differential Equations in Probability
Published 2011-01-01“…The aim of the paper is to compute the probability that the process will hit a given part of the boundary of the stopping region first. …”
Get full text
Article -
10975
NUMERICAL MODELING OF DYNAMICS OF THE CROSS STRESSES CHANGE ALONG THE LENGTH OF ROUND INGOT IN MNLZ-3
Published 2006-08-01“…The dynamics of the thermal stresses along the length of ingot of circular section with diameter 160 mm and 240 mm of low-carbon steel St20 is established by means of computer modeling.…”
Get full text
Article -
10976
Predecessors Existence Problems and Gardens of Eden in Sequential Dynamical Systems
Published 2019-01-01“…In this paper, we deal with one of the main computational questions in network models: the predecessor-existence problems. …”
Get full text
Article -
10977
An Update on Blood Pressure Short-Term Variability
Published 2002-01-01“…This article summarizes current achievements of computer-based methodologies in identifying the constituting components of short-term blood pressure variability and the underlying regulatory mechanisms. …”
Get full text
Article -
10978
Combinatorics of Second Derivative: Graphical Proof of Glaisher-Crofton Identity
Published 2018-01-01“…The paper is meant for nonspecialists as a gentle introduction to the field of graphical calculus and its applications in computational problems.…”
Get full text
Article -
10979
Inverse Coefficient Problem of the Parabolic Equation with Periodic Boundary and Integral Overdetermination Conditions
Published 2013-01-01“…Under some assumption on the data, the existence, uniqueness, and continuous dependence on the data of the solution are shown by using the generalized Fourier method. The accuracy and computational efficiency of the proposed method are verified with the help of the numerical examples.…”
Get full text
Article -
10980
Performance analysis of complex field network coding based on moment generating function
Published 2012-11-01“…The moment generating function was introduced to analysis closed-form expression for the outage probability that the relays employ complex field network coding,and the effect on symbol error probability with various modulation mode was evaluated.Computer simulation results demonstrate that the difference between closed expression and the approximate representation of outage probability greatly relies on the level of signal to noise ratio.…”
Get full text
Article