Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
12861
Integrating Multi-Model Simulations to Address Partial Observability in Population Dynamics: A Python-Based Ecological Tool
Published 2024-12-01“…WAPET bridges the gap between comprehensive modeling capabilities and user-friendly interfaces, positioning itself as a versatile tool for both experienced researchers and non-computational stakeholders in biodiversity decision-making processes.…”
Get full text
Article -
12862
Primary Nocardia Infection Causing a Fluorodeoxyglucose-Avid Right Renal Mass in a Redo Lung Transplant Recipient
Published 2018-01-01“…Special stains confirmed a diagnosis of Nocardia renal abscess. Computed tomography of the chest and brain revealed no lesions consistent with infection. …”
Get full text
Article -
12863
A Lightweight Small Target Detection Algorithm for UAV Platforms
Published 2024-12-01“…Additionally, the low computational capability of UAVs is challenged when trying to meet the requirements of large neural networks. …”
Get full text
Article -
12864
5G OFDM channel estimation method based on complex-valued generative adversarial network
Published 2024-03-01“…Channel estimation methods based on least square (LS) and minimum mean square error (MMSE) effectively utilize the system’s sparsity, but LS algorithms face low computational precision, while MMSE algorithms suffer from high computational complexity. …”
Get full text
Article -
12865
Wavenumber-dependent transmission of subthreshold waves on electrical synapses network model of Caenorhabditis elegans
Published 2025-01-01“…A theoretical and computational model presented in this study provided fundamental insight for understanding how the multi-path constructive/destructive interference of the subthreshold oscillations propagating on electrically coupled neural networks could generate wavenumber-dependent synchronized rhythmic activity.…”
Get full text
Article -
12866
An innovative semiconducting Ni(II)-metallogel based robust random access memory (RRAM) device for advanced flexible electronics applications
Published 2024-12-01“…This work highlights the potential of Ni(II)-metallogels for non-volatile memory, neuromorphic computing, flexible electronics, and optoelectronics. …”
Get full text
Article -
12867
Percutaneous vacuum-assisted tumor thrombectomy using angiovac and penumbra lightning 12 aspiration systems
Published 2025-04-01“…A 19-year-old female presented with a 2-month history of abdominal discomfort and palpable abdominal mass; a computer tomography scan revealed a large retroperitoneal mass as well as high suspicion of thrombus in her inferior vena cava. …”
Get full text
Article -
12868
Artificial intelligence in dentistry—A review
Published 2023-02-01“…Owing to the rapid development of three cornerstones of current AI technology—big data (coming through digital devices), computational power, and AI algorithm—in the past two decades, AI applications have started to provide convenience to people's lives. …”
Get full text
Article -
12869
Unveiling Wunderlich syndrome: Diagnosis and management of a rare spontaneous renal hematoma
Published 2025-03-01“…Symptoms typically present as nondescript flank pain, but a flank mass and hypovolemic shock are also possible. Computed tomography (CT) imaging with intravenous contrast should be the modality of choice to diagnose WS, with recent studies highlighting the efficacy of transcatheter arterial embolization (TAE) as the preferred treatment over surgery. …”
Get full text
Article -
12870
FF-YOLO: Fashion Fabric Detection Algorithm Based on YOLOv8
Published 2025-01-01“…Furthermore, we propose a Lightweight Multi-Level Asymmetry Detector Head (LADH) to replace the head, improving the computational efficiency of the model’s inference process. …”
Get full text
Article -
12871
Marshall–Olkin Extended Gumbel Type-II Distribution: Properties and Applications
Published 2022-01-01“…Due to the advance computer technology, the use of probability distributions has been raised up to solve the real life problems. …”
Get full text
Article -
12872
Classification Algorithms in Automatic Diagnosis of ECG Arrhythmias: A Review
Published 2024-01-01“…Research on automatic diagnosis of cardiac diseases by means of computer-aided ECG diagnosis has been carried out for decades. …”
Get full text
Article -
12873
Learning From High-Cardinality Categorical Features in Deep Neural Networks
Published 2022-06-01“…To address the issue of encoding categorical variables in environments with a high cardinality, we also seek a general-purpose approach for statistical analysis of categorical entries that is capable of handling a very large number of catego-ries, while avoiding computational and statistical difficulties. Our proposed approach is low dimensional; thus, it is very efficient in processing time and memory, it can be computed in an online learning setting. …”
Get full text
Article -
12874
A novel and fast crash simulation method: Revolutionising racetrack safety barrier analysis
Published 2025-03-01“…While the FE method exhibited higher accuracy, the mass-spring model offered superior computational efficiency, making it particularly suitable for simulating a variety of crash configurations. …”
Get full text
Article -
12875
Ship Formation and Route Optimization Design Based on Improved PSO and D-P Algorithm
Published 2025-01-01“…When the number of iterations is 1000, the route optimization model has a route coverage rate of 95.9% on the training set, an average error of 30.5 meters, and a computation time of 45.9 seconds, achieving zero collisions. …”
Get full text
Article -
12876
LE-YOLOv5: A Lightweight and Efficient Neural Network for Steel Surface Defect Detection
Published 2024-01-01“…Therefore, based on the industrial scenario of low computational force, this study proposed a lightweight and efficient defect detector called LE-YOLOv5. …”
Get full text
Article -
12877
Automotive ethernet controller authentication method based on national cryptographic algorithms
Published 2022-12-01“…With the development of intelligent and connected cars, cyber security of automotive ethernet becomes the focus of automotive industry.Authentication is one of the key technologies for automotive ethernet security.The existing authentication methods have shortcomings to meet the requirements of both safety and electronic controllers’ performance.Besides, national cryptographic algorithms are becoming a trend for automotive network security, while the related research in automotive ethernet area is still in starting phase.In order to balance the limited computing performance of electronic controllers and high security requirements of automotive ethernet, a two-stage trust chain authentication method based on national cryptographic algorithms was proposed.The method can be used in different automotive ethernet topologies.A trust chain was built up based on authentication credentials, which linked the two authentication stages, namely the initial stage and the vehicle using stage.The initial stage was triggered by diagnosis instrument at end of line or controller replacement.It deployed complete authentication based on SM2 algorithm and certificates in the initial stage.The vehicle using stage was triggered by ethernet gateway at vehicle power-on or network wakeup.In this stage, the method deployed fast authentication based on SM4 algorithm and authentication credential trust chain.The authentication credentials for trust chain were generated by credential functions.In order to ensure security, each credential was generated based on last successful authentication parameters dynamically.The test results on automotive ethernet controllers show that the method has lower computing cost and higher security level, and it can guarantee both performance and security.…”
Get full text
Article -
12878
Ice volume and thickness of all Scandinavian glaciers and ice caps
Published 2024-01-01“…The validation statistics computed indicate good agreement between modelled and observed thicknesses (RMSE = 55 m, Pearson's r = 0.87, bias = 0.8 m), outperforming all other ice thickness maps available for the region. …”
Get full text
Article -
12879
„Nowe” problemy wychowawcze w dobie „nowych” mediów
Published 2012-12-01“…They are everyday household members of Facebook, Twitter, MySpace, YouTube, Communicators and blogs as well as the slaves of computer games. The computer network addicts and leaves sometimes dramatic marks in their lives. …”
Get full text
Article -
12880
Primary Bone Marrow B-Cell Lymphoma Undetected by Multiple Imaging Modalities That Initially Presented with Hypercalcemia
Published 2018-01-01“…To exclude malignancy, we performed imaging studies, including abdomen or chest computed tomography and positron emission tomography-computed tomography; however, no suspicious lesion was found, although the serum PTH-related peptide level was elevated at 4.0 pmol/L. …”
Get full text
Article