Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
11401
An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid Systems
Published 2024-06-01“…The main obstacles in turning the heterogeneous large dataset into useful results are computational burden and information security. The original contribution of this paper is to develop a new big data framework for detecting various intrusions from the smart grid systems with the use of AI mechanisms. …”
Get full text
Article -
11402
Selective Ensemble Learning Method for Belief-Rule-Base Classification System Based on PAES
Published 2019-12-01Get full text
Article -
11403
Online Internet Traffic Monitoring System Using Spark Streaming
Published 2018-03-01Get full text
Article -
11404
SumGPT: A Multimodal Framework for Radiology Report Summarization to Improve Clinical Performance
Published 2025-01-01Get full text
Article -
11405
Application of Big Data Technology to Assessments of Female Ovarian Reserve Dysfunction
Published 2025-01-01Get full text
Article -
11406
APT Adversarial Defence Mechanism for Industrial IoT Enabled Cyber-Physical System
Published 2023-01-01Get full text
Article -
11407
-
11408
LSP transcoding method between 3GPP AMR-NB and ITU-T G.729A based on GMM
Published 2010-01-01“…An efficient transcoding algorithm of LSP(line spectrum pairs) parameters based on GMM(Gaussian mixture model) was proposed and implemented through the mathematical analysis of GMM.Meanwhile,several practical issues in details were analyzed under experiments.The experiments indicate that the computational complexity of the proposed LSP transcoding algorithm is reduced by above 78% and the transcoded speech quality is not worse than DTE method.…”
Get full text
Article -
11409
Application of SDN and NFV technology in the cloud data center
Published 2016-01-01“…Taking the cloud computing data center as the breakthrough point,firstly,the characteristics of overlay network,SDN controller and VxLAN in SDN field were presented.Secondly,two kinds of problems about general server performance and service chain were analyzed in NFV field.Finally,the early test progress of SDN/NFV technology and related conclusions were expounded,then VDC was discussed.…”
Get full text
Article -
11410
Design of a multistage anti-jam GPS receiver
Published 2005-01-01“…Finally the simulation results presented prove it is of advantage in decreasing computation complexity and improve anti-jam capability.…”
Get full text
Article -
11411
Laguerre-type Bell polynomials
Published 2006-01-01“…The Laguerre-type Bell polynomials are useful in order to compute the nth Laguerre-type derivatives of a composite function. …”
Get full text
Article -
11412
On a theorem of B. Keller on Yoneda algebras of simple modules
Published 2024-11-01“…We provide a proof of an extension of Keller’s theorem to abelian length categories by reducing the problem to a particular class of Nakayama algebras, where the claim can be shown by direct computation.…”
Get full text
Article -
11413
Approach to weak signal extraction and detection via sparse representation
Published 2015-11-01“…The sparsity models and their popular evaluation algorithms were presented.A sparse representation based approach to weak signal extraction and detection was proposed.Furthermore,a fast algorithm was developed to reduce the computational complexity of the proposed method.In addition,both qualitative and quantitative evaluation methods were designed to analyze the proposed approach.A large number of experiments demonstrate the robustness and the adaptivity of the proposed approach.…”
Get full text
Article -
11414
“Primary Omental Hydatid Cyst”: A Rare Entity
Published 2012-01-01“…Diagnosis can be achieved with contrast-enhanced computed tomography of abdomen and pelvis along with serology. …”
Get full text
Article -
11415
AN INCOMPATIBLE LAYERWISE METHOD FOR BENDING LAMINATED SHELLS
Published 2018-01-01“…Several examples are studied to validate the capabilities of proposed method.The numerical results indicate that The ILWM achieves better convergence rate and computational accuracy compared with LWM for bending models.…”
Get full text
Article -
11416
Five Open Problems on Designing 5G Network Architecture
Published 2014-10-01“…Virtualization, cloud computing and SDN are new technologies that enables innovative architecture design. …”
Get full text
Article -
11417
Anticontrol of Chaos for a Class of Delay Difference Equations Based on Heteroclinic Cycles Connecting Repellers
Published 2014-01-01“…An illustrative example is provided with computer simulations.…”
Get full text
Article -
11418
Teaching of programming in advanced course of informatics
Published 2002-12-01“…The stages in teaching of programming are analyzed: basic computer skills, basic knowledge in programming, and developing of programs. …”
Get full text
Article -
11419
The Application of the Homotopy Analysis Method and the Homotopy Perturbation Method to the Davey-Stewartson Equations and Comparison between Them and Exact Solutions
Published 2013-01-01“…Comparison of the HPM results with the HAM results, and compute the absolute errors between the exact solutions of the DS equations with the HPM solutions and HAM solutions are obtained.…”
Get full text
Article -
11420
The Laplacian-Energy-Like Invariants of Three Types of Lattices
Published 2016-01-01“…In addition, we obtain explicit asymptotic values of these invariants with software-aided computations of some integrals.…”
Get full text
Article