Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
11261
New services and development trend in 5G environment
Published 2016-06-01“…5G and its related technologies have been the research focuses in the mobile telecommunication industry.The services and applications,their related technologies and development trends were studied.The requirements of mobile bandwidth,the current service limitationand the service development trends were analyzed and described in aspects of multi-media services,internet of things services cloud computing and artificial intelligence technology.…”
Get full text
Article -
11262
NUMERICAL MODELING OF STRESSES NEAR THE SURFACE IN THE INGOT OF CIRCULAR SECTION, CRYSTALLIZABLE AT CIRCULAR TORCH SECONDARY COOLING
Published 2004-11-01“…The results of computer calculations of the stresses, generated in outside layer of ingot of steel 20 of circular section with diameter 300 mm, in application to one of the industrial technological schemas of RUP “BMZ”, are presented. …”
Get full text
Article -
11263
Watermarking text document based on statistic property of part of speech string
Published 2007-01-01“…An algorithm resolving nonlinear entropy equation with multivariable was described and proved firstly,then a new scheme where a text document is marked by accommodating probability distribution of certain part of speech strings to entropy constitutes the watermark was designed.Watermark function in the scheme values in a real number set domi-nated by computing precision,it is helpful to advances watermark capacity significantly.…”
Get full text
Article -
11264
Multi-parties key agreement protocol based on elliptic curve
Published 2016-05-01“…The key agreement protocol is a shared key mechanism between two or more participants in a public channel.A multi key agreement protocol based on elliptic curve was designed by using the secure one-way function.The protocol was based on password authentication.The protocol designed can satisfy the security characteristics of the key exchange protocol,and has high computing efficiency.…”
Get full text
Article -
11265
On the One Dimensional Poisson Random Geometric Graph
Published 2011-01-01“…Given a Poisson process on a bounded interval, its random geometric graph is the graph whose vertices are the points of the Poisson process, and edges exist between two points if and only if their distance is less than a fixed given threshold. We compute explicitly the distribution of the number of connected components of this graph. …”
Get full text
Article -
11266
Hybrid models of cell and tissue dynamics in tumor growth
Published 2015-07-01“…Hybrid models of tumor growth, in which some regions are described at the celllevel and others at the continuum level, provide a flexible description thatallows alterations of cell-level properties and detailed descriptions of theinteraction with the tumor environment, yet retain the computational advantagesof continuum models where appropriate. …”
Get full text
Article -
11267
Representation theory of finite abelian groups applied to a linear diatomic crystal
Published 1980-01-01“…After a brief review of matrix representations of finite abelian groups, projection operators are defined and used to compute symmetry coordinates for systems of coupled harmonic oscillators. …”
Get full text
Article -
11268
TESTING OF CYCLIC STRUCTURAL CHANGES IN SWITCHING REGIME VECTOR AUTOREGRESSIVE MODELS
Published 2016-11-01“…Accuracy of the approach is examined by means of computer simulation experiments.…”
Get full text
Article -
11269
A Rare Case of an Inflammatory Myofibroblastic Tumor in a Middle-Aged Female
Published 2012-01-01“…We report a case of a 64-years-old woman with a fever and abdominal discomfort for 3 months; a computer tomography was performed indicating gastrointestinal stromal tumor. …”
Get full text
Article -
11270
Permanence and Global Attractivity of a Discrete Logistic Model with Impulses
Published 2013-01-01“…The constructed model is more easily implemented at computer and is a better analogue of the continuous-time dynamic system. …”
Get full text
Article -
11271
SMARANDACHE ANTI ZERO DIVISORS
Published 2025-01-01“…Some results related to the given concepts are proved in detail. Accordingly, a Computer Algebra System (GAP) is used to verify the results of this study …”
Get full text
Article -
11272
New Nonlinear Systems Admitting Virasoro-Type Symmetry Algebra and Group-Invariant Solutions
Published 2014-01-01“…With the aid of symbolic computation by Maple, we extend the application of Virasoro-type symmetry prolongation method to coupled systems with two-component nonlinear equations. …”
Get full text
Article -
11273
Natural Frequencies of Shear Deformable Plates by Polyharmonic Splines
Published 2013-01-01“…The natural frequencies of vibration are computed for various plates and compared with some available published results. …”
Get full text
Article -
11274
A Four-Order Linear Recurrence Formula Involving the Quartic Gauss Sums and One Kind Two-Term Exponential Sums
Published 2021-01-01“…The main purpose of this paper is using the analytic method and the properties of the classical Gauss sums to study the computational problem of one kind hybrid power mean involving the quartic Gauss sums and two-term exponential sums and give an interesting four-order linear recurrence formula for it. …”
Get full text
Article -
11275
Distance-based target tracking algorithm in binary sensor network
Published 2010-01-01“…A distance-based target tracking algorithm for binary sensor network was proposed.This algorithm can decide the output bit information and compute the weighting simultaneously.The simulation is used to validate the effectiveness of distance-based weighting scheme.This algorithm has good performance,when the target moves linearly,curvilinear,or randomly through the sensing field,and the error distribution of single target position is in .…”
Get full text
Article -
11276
Synchronization Measure Based on a Geometric Approach to Attractor Embedding Using Finite Observation Windows
Published 2018-01-01“…The approach is based on the comparison of optimal time delay sequences that are computed for segments of the considered time series. …”
Get full text
Article -
11277
Vena Cava Superior Syndrome Related to Right Heart Invasion of an Unresectable Hepatocellular Carcinoma
Published 2016-01-01“…The patient presented with clinical signs of a vena cava superior syndrome. Computed tomography and transthoracic echocardiography demonstrated a large tumoral mass lesion extending from the left liver lobe into the inferior vena cava right atrium and right ventricle. …”
Get full text
Article -
11278
Distance to Spaces of Semicontinuous and Continuous Functions
Published 2019-01-01“…Given a topological space X, we establish formulas to compute the distance from a function f∈RX to the spaces of upper semicontinuous functions and lower semicontinuous functions. …”
Get full text
Article -
11279
Is the Best Fitting Curve Always Unique?
Published 2013-01-01“…Fitting straight lines and simple curved objects (circles, ellipses, etc.) to observed data points is a basic task in computer vision and modern statistics (errors-in-variables regression). …”
Get full text
Article -
11280
Deployment strategy of NFV central office in core network
Published 2017-04-01“…Central office is the infrastructure for the deployment of communications equipment,and NFV is a telecom cloud with service quality assurance.The needs that collaborative development between core network and computer room was introduced and the status of core network room was analyzed,and the planning of NFV room was proposed from the aspect of transformation strategy of data center and central office and layout of office and quantity planning strategy.…”
Get full text
Article