Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
12341
A Rare Subcutaneous Manifestation of Metastatic Renal Cell Carcinoma
Published 2016-01-01“…Ultrasound imaging of the lumps and later of the abdomen picked up a right renal tumour which led to further computed tomography and bone scans. The bone scan confirmed that the forehead lump was a calvarial metastasis and such a presentation for metastatic RCC is very rare which bears a significantly poorer prognosis.…”
Get full text
Article -
12342
Numerical Prediction of Flow and Heat Transfer in a Two-pass Square Channel with 90° Ribs
Published 2001-01-01“…The rib height-to-hydraulic diameter ratio (e/Dh) is 0.125 and the rib pitch-to-height ratio (P/e) is 10. The computation results were compared with the experimental data of Ekkad and Han (1997) at a Reynolds number (Re) of 30,000.…”
Get full text
Article -
12343
Numerical Solution of Problem for Non-Stationary Heat Conduction in Multi-Layer Bodies
Published 2007-12-01“…Solution of the problem is realized with the help of methods of a numerical experiment and computer modeling.…”
Get full text
Article -
12344
Efficient chosen-ciphertext secure proxy re-encryption scheme
Published 2013-07-01“…Under the same security level, this scheme has lower computational cost than that of WJ scheme.…”
Get full text
Article -
12345
Cooperative integration of spatially resolved multi-omics data with COSMOS
Published 2025-01-01“…Abstract Recent advancements in biological technologies have enabled the measurement of spatially resolved multi-omics data, yet computational algorithms for this purpose are scarce. …”
Get full text
Article -
12346
Using the Functional Reach Test for Probing the Static Stability of Bipedal Standing in Humanoid Robots Based on the Passive Motion Paradigm
Published 2013-01-01“…The goal of this paper is to analyze the static stability of a computational architecture, based on the Passive Motion Paradigm, for coordinating the redundant degrees of freedom of a humanoid robot during whole-body reaching movements in bipedal standing. …”
Get full text
Article -
12347
Inverse Estimates for Nonhomogeneous Backward Heat Problems
Published 2014-01-01“…We also present numerical computations that verify the accuracy of our approximation.…”
Get full text
Article -
12348
Optimization of the learning rate in the algorithm for data visualization
Published 2005-12-01“…In our research the emphasis is put on the optimization of the learning rate to save computation time without losing the mapping quality. …”
Get full text
Article -
12349
Analysis of constant modulus blind equalization algorithms base on "data reuse"
Published 2009-01-01“…The constant modulus blind equalization algorithm based on "data reuse" could be used to solve the problem of blind equalization of short burst signals,but its important properties hadn’t been studied.The ill-convergence caused by data reuse was analyzed and the restriction was given firstly,and secondly,the conditions of data reuse constant modulus algorithm reaching to the performance of long time signals equalization was analyzed in detail and gave the corresponding results.The validity of these analyses is proved by computer simulation.…”
Get full text
Article -
12350
Investigation of virtual collaborative learning environment
Published 2003-12-01“…Fle3 software was used to create the learning environments for teaching informatics in a secondary school and for teaching computer math systems at the Vilnius Pedagogical University. …”
Get full text
Article -
12351
Willmore-Like Tori in Killing Submersions
Published 2018-01-01“…The first variation formula and Euler-Lagrange equations for Willmore-like surfaces in Riemannian 3-spaces with potential are computed and, then, applied to the study of invariant Willmore-like tori with invariant potential in the total space of a Killing submersion. …”
Get full text
Article -
12352
Improved FFT-based alpha-stable density approximation algorithm
Published 2007-01-01“…Approximation of density of α-stable process is an elementary works in modeling network flow using α-stable process.Combining the mathematical properties of characteristic function of α-stable process with the traditional approximating algorithm,an improved FFT-based algorithm was proposed.The improved algorithm has 2 noticeable features: automatically choosing the sampling space and sampling interval,importing frequency expansion.Experiments show that it can decrease calculation complexity and effectively control computation error.…”
Get full text
Article -
12353
Analysis and development suggestions of operators in the field of industrial internet identification analysis system
Published 2020-02-01“…With the development of industrial internet technology,5G and edge computing,countries have put forward their own industrial Internet development strategies and construction of industrial Internet platform.Cloud edge collaborative industrial Internet platform is an important part of the development of industrial Internet.The way of industrial Internet cloud edge collaboration was introduced,the problems in the process of cloud edge collaboration were expounded,and practices were taken based on data collaboration and model collaboration.…”
Get full text
Article -
12354
Hanter la machine : reconquêtes de la conscience humaine dans le cyberpunk à la française
Published 2017-11-01“…This paper aims at identifying an enduring peculiarity regarding the way “French Cyberpunk” deals with human-computer interactions : the importance of human consciousness for creating artificial intelligence.…”
Get full text
Article -
12355
Lie Symmetry Analysis for the General Classes of Generalized Modified Kuramoto-Sivashinsky Equation
Published 2021-01-01“…In this present work, we focus on Lie symmetry analysis to find symmetries of some general classes of KS-type equation. We also compute transformed equivalent equations and some invariant solutions of this equation.…”
Get full text
Article -
12356
Complex Dynamics in a Nonlinear Cobweb Model for Real Estate Market
Published 2007-01-01“…The chaotic features are justified numerically via computing maximal Lyapunov exponents and sensitive dependence on initial conditions. …”
Get full text
Article -
12357
Transfusion-Dependent Anemia in a Simultaneous Pancreas and Kidney Transplant Recipient
Published 2020-01-01“…The patient underwent multiple contrast-enhanced computed tomography scans and multiple endoscopies with confounding features until, eventually, the diagnosis was established. …”
Get full text
Article -
12358
Les bouleversements de l’espace-temps
Published 2012-02-01“…The author argues that the Internet, by operating a displacement of the human memory towards the computer memory, and by introducing a feeling of dematerialization and synchrony, triggers a compensatory reaction that manifests itself in the multiplication of commemorative ceremonies and places dedicated to events of the past.…”
Get full text
Article -
12359
The Psychopathology of Basal Ganglia Calcification
Published 1989-01-01“…Basal ganglia calcification (BGC) was found in 36 of 4122 patients undergoing computed tomography as part of a clinical investigation of their psychiatric illness. …”
Get full text
Article -
12360
Buckling Analysis for Flexspline Structure in Harmonic Drive with FEM
Published 2017-01-01“…The research results show that the mode shapes of torsional buckling are close to that of the actual instable failure,and computation result is good agreement with engineering problem. …”
Get full text
Article