Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
12321
Study on Key Technologies of Intelligent IoT Device
Published 2015-08-01“…Smart IoT devices go into product stage from hype stage.Sensors are being miniaturized,integrated,intelligent and diversified,turn the reality into digital.IoT device’s intelligent is based on power of processor and advanced operation system,and be enhanced by the cloud computing and big data.As smart phone,the smart IoT devices need to build an active ecosystem that engage developers to innovate.The several key technologies development status and future trends were explored,analyzed,and displayed.…”
Get full text
Article -
12322
A Case of Amyopathic Dermatomyositis with Pneumomediastinum and Subcutaneous Emphysema
Published 2015-01-01“…A 34-year-old man was admitted with dyspnea, cough, and fever. Thorax computed tomography revealed ground glass opacities and pneumomediastinum. …”
Get full text
Article -
12323
Parallel Rank of Two Sandpile Models of Signed Integer Partitions
Published 2013-01-01“…The concept of fundamental sequence is a refinement of the concept of parallel convergence time for these models. We compute the parallel convergence time and the fundamental sequence when X is the finite lattice of all the signed integer partitions such that , where , and when X is the sublattice of all the signed integer partitions of having exactly d nonzero parts.…”
Get full text
Article -
12324
Improved non-Rake receiver based on two dimensional spread spectrum for WCDMA systems
Published 2005-01-01“…And compared with the conventional Rake receiver, the proposed receiver is presented by computer simulations to support its bit error rate (BER) performance when it is difficult for the Rake receiver to distinguish each path accurately.…”
Get full text
Article -
12325
Misdiagnosed Uterine Rupture of an Advanced Cornual Pregnancy
Published 2012-01-01“…Ultrasound examination and computer tomography revealed no sign of abnormal pregnancy. …”
Get full text
Article -
12326
Molecular Dynamics Simulation of Nanoscale Channel Flows with Rough Wall Using the Virtual-Wall Model
Published 2018-01-01“…The virtual-wall model for the rough wall is proposed and validated. The computational efficiency can be improved greatly by using this model, especially for the low-density gas flow in nanoscale channels. …”
Get full text
Article -
12327
Hyalinizing Granuloma: An Unusual Case of a Pulmonary Mass
Published 2010-01-01“…We describe the case of pulmonary hyalinizing granuloma in a 34-year-old asymptomatic man who presented with a pulmonary nodule apparent by chest radiography and computed tomography (CT). He had a history of previous treatment for tuberculosis. …”
Get full text
Article -
12328
Identity-based incremental signature scheme from lattices
Published 2021-01-01“…By taking ideas of identity-based cryptography into incremental signatures, the concept of identity-based incremental signature was proposed, and then a specific scheme from lattices was also constructed.The scheme was shown to be provably secure against adaptive chosen identity and chosen message attacks in the standard model, assuming the hardness of the small integer solution problem.Theoretical analysis and experimental results show that the computational overhead of the incremental signature algorithm is less than that of the standard signature algorithm.…”
Get full text
Article -
12329
Cryptanalysis of the Vesta-2M stream cipher
Published 2003-01-01“…The author point out the mistake of attack introduced by the paper [1], and introduce a known plaintext attack method where only a small segment of known plaintext(about hundreds of bits) , the upper bound of the compute complexity is)2(372O.…”
Get full text
Article -
12330
Frequency offset estimator for OFDM with time-frequency training sequence
Published 2006-01-01“…A ratio-adjustable time-frequency training sequence was proposed.The coarse carrier frequency offset(CFO) estimation was accomplished with the aid of the training sequence in frequency domain and a predefined lookup table,while the fine one was obtained by the aid of the training sequence in time domain.Simulation results show that the per-formance of the proposed method is better than Lei’s method with almost the same overhead.However,its computational complexity is much lower than Lei’s.…”
Get full text
Article -
12331
On Polynomial Solutions of Pell’s Equation
Published 2021-01-01“…In this paper, some quadratic polynomial solutions are given for the equation x2−Dy2=±1 which are significant from computational point of view.…”
Get full text
Article -
12332
Asymptomatic Presentation of Aggressive Ossifying Fibroma:A Case Report
Published 2011-01-01“…This paper emphasizes the importance of computed tomography in diagnosing such unapparent aggressive tumors.…”
Get full text
Article -
12333
Constrained Solutions of a System of Matrix Equations
Published 2012-01-01“…As an auxiliary, an algorithm is provided to compute the least squares symmetric orthogonal solutions, and meanwhile an example is presented to show that it is reasonable.…”
Get full text
Article -
12334
Absorption by an Optical Dipole Antenna in a Structured Environment
Published 2012-01-01“…We compute generalized absorption and extinction cross-sections of an optical dipole nanoantenna in a structured environment. …”
Get full text
Article -
12335
Digital twin assisted surgery, concept, opportunities, and challenges
Published 2025-01-01“…Abstract Computer-assisted surgery is becoming essential in modern medicine to accurately plan, guide, and perform surgeries. …”
Get full text
Article -
12336
Verspera, du plan d’époque à la visite virtuelle : une fructueuse collaboration interdisciplinaire
Published 2023-07-01“…In the Verspera project, historians, archivists, curators and computer scientists worked together on the very rich corpus of the Ancien Régime plans of the Château de Versailles. …”
Get full text
Article -
12337
Research on semantics of trust transitivity in cryptographic primitives
Published 2008-01-01“…Under the background of trustable computing and trust management, the semantics of trust transitivity in cryptographic primitives were concerned, and an embryo model was proposed. …”
Get full text
Article -
12338
On a Class of Self-Adjoint Compact Operators in Hilbert Spaces and Their Relations with Their Finite-Range Truncations
Published 2013-01-01“…The comparisons are established in terms of worst-case norm errors of the composite operators generated from iterated computations. Some boundedness properties of the worst-case norms of the errors in their respective fixed points in which they exist are also given. …”
Get full text
Article -
12339
Research on professional learning margin of university information security teachers in China
Published 2017-07-01“…Analyzing the educational background features of China’s university information security teachers can provide reference for the teaching staff construction of cyberspace security discipline.Based on the result of a national survey,Web content analysis was used to approach to analyze the resumes of information security teachers from Internet.The result shows that these teachers are mainly computer,mathematics,telecommunication and electronics majors,from undergraduate to master,doctorate,postdoctoral,their professional gradually to the information security professional gathering.…”
Get full text
Article -
12340
On adaptive refinements in discrete probabilistic fracture models
Published 2017-01-01“…It is employed to save computational time and increase solution accuracy. Recently, adaptivity has been introduced also for discrete particle models. …”
Get full text
Article