Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
12841
Threshold Accepting Heuristic for Fair Flow Optimization in Wireless Mesh Networks
Published 2014-01-01Get full text
Article -
12842
-
12843
Replica wormholes and entanglement islands in the Karch-Randall braneworld
Published 2025-01-01“…We mainly focus on the case that the ambient space is (2+1)-dimensional for which explicit computations can be done in each description of the set-up. …”
Get full text
Article -
12844
Impacts of noise and interference on the bit error rate of the FBMC-OQAM modulation scheme in 5G systems
Published 2024-05-01“…The graphical and numerical data obtained through computer modeling demonstrates improved BER in 5G networks using FBMC-OQAM. …”
Get full text
Article -
12845
ARTIFICIAL INTELLIGENCE AS AN OBJECT OF MANAGEMENT: A BENEFIT FOR CIVILISATION OR A THREAT TO MANKIND?
Published 2023-12-01“…The development of sophisticated computers and robots poses risks to the world’s people. …”
Get full text
Article -
12846
Dental bur detection system based on asymmetric double convolution and adaptive feature fusion
Published 2024-12-01“…The model also achieved a 14.4% reduction in parameter volume and a 17.9% decrease in computational expenditure, while achieving a flawless counting accuracy of 100%. …”
Get full text
Article -
12847
Scan-to-BIM-to-Sim: Automated reconstruction of digital and simulation models from point clouds with applications on bridges
Published 2025-03-01“…The framework, validated using the Arial Aqueduct Bridge case, reduces modelling time and computational demands, thereby streamlining construction simulations with improved accuracy and cost efficiency. …”
Get full text
Article -
12848
Current Control and Active Damping for Single Phase LCL-Filtered Grid Connected Inverter
Published 2020-01-01“…Other method uses active damping (AD) by adding a proportional control loop of filter capacitor current, but this method needs additional sensor to measure filter capacitor current; moreover, when the control loops are digitally implemented, the computation delay in AD control loop will lead to some difficulties in choosing control parameters and maintaining system stability. …”
Get full text
Article -
12849
SHASI-ML: a machine learning-based approach for immunogenicity prediction in Salmonella vaccine development
Published 2025-02-01“…The model showed superior recall and F1-scores compared to existing computational approaches.DiscussionThese findings establish SHASI-ML as an efficient computational tool for prioritizing immunogenic candidates in Salmonella vaccine development. …”
Get full text
Article -
12850
Robot Simulation on Agri-Field Point Cloud With Centimeter Resolution
Published 2025-01-01“…The simulator in this study enables fast computation and accurate prediction of robot movements on centimeter-resolution agri-field point-cloud models, supporting research on agricultural robots not limited to the growing season.…”
Get full text
Article -
12851
Analysis of Intelligent Transportation System Application Based on Internet of Things and Big Data Technology under the Background of Information Society
Published 2022-01-01“…Traffic pressure promotes the massive use of Internet of Things and other technologies in the transportation system. The integration of computer, Internet of Things and transportation system forms a new intelligent transportation concept. …”
Get full text
Article -
12852
Development of a 3D cephalometric index to grade severity of dentofacial deformity in patients with juvenile idiopathic arthritis
Published 2025-01-01“…Data were collected from a population-based Nordic JIA cohort of 240 patients that received a cone-beam computed tomography (CBCT) scan approximately 17 years after onset of JIA. …”
Get full text
Article -
12853
Impact of frequent ARID1A mutations on protein stability provides insights into cancer pathogenesis
Published 2025-01-01“…We analyzed five frequent missense mutations R1020S, M1022K, K1047Q, G1063V, and A1089T identified in The Cancer Genome Atlas (TCGA) to assess their effects on the stability of the ARID domain using a hybrid experimental and computational approach. By combining computational stability from web server tools, the structural dynamics from replica exchange discrete molecular simulation (rexDMD), and thermal and chemical denaturation experiments, we found that the R1020S mutation severely decreases structural stability, making it the most impactful, while M1022K has minimal effect, and others lie in between. …”
Get full text
Article -
12854
New insights into axion freeze-in
Published 2024-11-01“…In this work, we revisit the computation of the freeze-in abundance and clarify important issues. …”
Get full text
Article -
12855
Numerical characterization of hemodynamics conditions near aortic valve after implantation of left ventricular assist device
Published 2011-05-01“…The use of LVADs has been associated with thrombus formation next to the aortic valve and close to the anastomosis region,especially in patients in which the native cardiac function isnegligible and the aortic valve remains closed.Stagnation points and recirculation zones have been implicated as the main fluid dynamics factors contributing to thrombus formation.The purpose of the present study was to develop and use computer simulations based on afluid-structure interaction (FSI) solver to study flow conditions corresponding to different strategies inLVAD ascending aortic anastomosis providing a scenario with the lowest likelihood of thrombus formation.A novel FSI algorithm was developed to dealwith the presence of multiple structures corresponding to different elastic properties ofthe native aorta and of the LVAD cannula.A sensitivity analysis of different variables was performed to assess their impact of flow conditionspotentially leading to thrombus formation.It was found that the location of the anastomosis closest to the aortic valve(within 4 cm away from the valve)and at the angle of 30$^\circ$ minimizes the likelihood of thrombus formation.Furthermore, it was shownthat the rigidity of the dacron anastomosis cannula plays almost no role in generating pathologicalconditions downstream from the anastomosis.Additionally, the flow analysis presented in this manuscriptindicates that compliance of the cardiovascular tissue acts as a natural inhibitor of pathological flow conditions conducive to thrombus formationand should not be neglected in computer simulations.…”
Get full text
Article -
12856
Primary Pleural Angiosarcoma in a 63-Year-Old Gentleman
Published 2013-01-01“…An abdominal contrast-enhanced computed tomography (CT) scan showed two right diaphragmatic pleural masses. …”
Get full text
Article -
12857
Successful Management in an Infant Patient of PHACE Syndrome with a Complicated Aortic Arch Anomaly
Published 2022-01-01“…She was born at 36 weeks of gestation (birth weight, 2,150 g) and the diagnosis was confirmed by three-dimensional computed tomography. Because her patent ductus arteriosus did not close at first, her heart failure was managed preoperatively without prostaglandin E1. …”
Get full text
Article -
12858
Stability analysis of cellular structures made of flat metal sheet piles
Published 2024-07-01“…Analytically obtained results were compared with those computed in two- and three-dimensional settings using Midas FEA NX software package.Results. …”
Get full text
Article -
12859
Analysis and 3D modelling of percolated conductive networks in nanoparticle-based thin films
Published 2025-01-01“…Then, the electrical conductivity of the percolated networks in these virtual structures was computed using the finite element method for various partial oxygen pressures. …”
Get full text
Article -
12860
Defense scheme for the world state based attack in Ethereum
Published 2022-04-01“…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
Get full text
Article