Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
12961
The effect of different fabrication techniques on porosity of cobalt-chromium cast removable partial denture farm works.
Published 2022-12-01“…The purpose of this study was to evaluate the overall porosity of conventional versus computer-aided design/computer-aided manufactured (CAD/CAM) and 3D-Printed removable partial denture (RPD) frameworks based on tests data analysis, and to evaluate the porosity of each technique’s fabrication of the RPD frameworks. …”
Get full text
Article -
12962
State-of-the-art survey of privacy-preserving data aggregation in wireless sensor networks
Published 2018-10-01“…A state-of-the-art survey of privacy-preserving data aggregation techniques in wireless sensor networks was reviewed.Firstly,preliminaries were introduced,including network models,adversary models,and performance evaluation metrics.Secondly,existing related work was classified into several types according to privacy preservation techniques,such as homomorphic encryption,data perturbation,slicing-mixing technique,generalization,secure multiparty computation,and the key mechanisms of typical protocols were elaborated and analyzed.Finally,the promising future research directions were discussed.…”
Get full text
Article -
12963
Prosthetic Valve Candida Endocarditis: A Case Report with 18F-FDG-PET/CT as Part of the Diagnostic Workup
Published 2020-01-01“…We describe two patients with Candida spp. prosthetic valve endocarditis (PVE) and 18fluorodeoxyglucose positron emission tomography/computed tomography (18F-FDG-PET/CT) as a part of diagnostic workup. …”
Get full text
Article -
12964
On the numerical solution of two point boundary value problem for the Helmholtz type equation by finite difference method with non regular step length between nodes
Published 2021-03-01“…The numerical results obtained for these model problems with known / constructed exact solution confirm the theoretical conclusions of the proposed method. The computational results obtained for these model problems suggest that method is efficient and accurate. …”
Get full text
Article -
12965
Fractional time delay estimation algorithm based on the fractional lower order moment
Published 2006-01-01“…It is shown by theoretical analysis and computer simulations that the proposed method is robust for both Gaussian and non-Gaussian impulsive noise environments.…”
Get full text
Article -
12966
Analysis of methods for ischemic stroke region recognition on CT slices
Published 2005-12-01“… There are developed several computer aided methods for recognition of ischemic stroke region on CT slices at this time. …”
Get full text
Article -
12967
Research on deterministic networking requirements and technologies for RDMA-WAN
Published 2023-11-01“…With the rapid development of AIGC large models and intelligent computing applications, deterministic networking technology for wide-area RDMA has become a recent research hotspot.The development path, implementation solutions and technical challenges of RDMA-WAN were analyzed, by setting up a laboratory and an outfield testing environment, with a series of testing and verifications.The deterministic demand characteristics and boundary performance indicators of RDMA-WAN were proposed.Finally, the deterministic networking technologies for RDMA-WAN were summarized and prospected.…”
Get full text
Article -
12968
Exact SNR and SIR analysis in Poisson wireless networks
Published 2017-03-01“…The analytical results are validated with computer simulation.…”
Get full text
Article -
12969
Simulation of Few Bifurcation Phase Diagrams of Belousov-Zhabotinsky Reaction with Eleven Variable Chaotic Model in CSTR
Published 2009-01-01“…We have given much importance on computer simulation work but not included the experimental methods in this paper.…”
Get full text
Article -
12970
Volar Dislocation of the Fourth and Fifth Carpometacarpal Joint Associated with Hamate Hook Fracture: A Case Report and Literature Review
Published 2020-01-01“…Using intraoperative computed tomography, the displaced fracture of the hamate hook was reduced by open reduction and internal fixation and fixed with a screw. …”
Get full text
Article -
12971
Optical hausdorff quantum energy of spherical magnetic particles
Published 2025-02-01“…Eventually, the Hausdorff energies of these spherical Lorentz fields according to the spherical system in $$\mathbb {S}^{2}$$ spherical space are computed.…”
Get full text
Article -
12972
Uniform Energy Decay Rates for the Fuzzy Viscoelastic Model with a Nonlinear Source
Published 2020-01-01“…Under weak assumptions of the function gt, with the aid of Mathematica software, the computational technique is used to construct the auxiliary functionals and precise priori estimates. …”
Get full text
Article -
12973
Invariant Solutions and Conservation Laws of the Time-Fractional Telegraph Equation
Published 2023-01-01“…By applying classical and nonclassical Lie symmetry analysis for the telegraph equation with α,β time-fractional derivatives and some technical computations, new infinitesimal generators are obtained. …”
Get full text
Article -
12974
Hybrid Bernstein Block-Pulse Functions Method for Second Kind Integral Equations with Convergence Analysis
Published 2014-01-01“…On the other hand, convergence analysis for this method is discussed. The method is computationally very simple and attractive so that numerical examples illustrate the efficiency and accuracy of this method.…”
Get full text
Article -
12975
Numerical Simulation of Fractional Zakharov–Kuznetsov Equation for Description of Temporal Discontinuity Using Projected Differential Transform Method
Published 2021-01-01“…The core aim of this study is to propose a novel computational procedure, namely, Elzaki transform iterative method to work out two-dimensional nonlinear time-fractional Zakharov–Kuznetsov equation numerically. …”
Get full text
Article -
12976
Retroperitoneal Lipoma Presenting with Nutcracker-Like Phenomenon
Published 2013-01-01“…I experienced a case of a 65-year-old man presenting with left flank pain and macrohematuria intermittently for 3 years. Computed tomography revealed a lipoma at the left pedicle of the kidney, 30 mm in diameter, causing a curving of the left renal artery and dilatation of the left renal vein. …”
Get full text
Article -
12977
Convex separable minimization problems with a linear constraint and bounded variables
Published 2005-01-01“…Some convex functions, important for problems under consideration, as well as computational results are presented.…”
Get full text
Article -
12978
Iterative Reproducing Kernel Method for Solving Second-Order Integrodifferential Equations of Fredholm Type
Published 2014-01-01“…The solution obtained by the method takes form of a convergent series with easily computable components. Furthermore, the error of the approximate solution is monotone decreasing with the increasing of nodal points. …”
Get full text
Article -
12979
Eavesdropping against wireless spatial scrambling secure communication: hyperplane clustering
Published 2014-04-01“…Simulation results show that the HC algorithm, compared with the existing MUSIC-like algorithms, holds the advantages of better anti-noise performance and lower computing complexity.…”
Get full text
Article -
12980
Variational Iteration Decomposition Method for Solving Eighth-Order Boundary Value Problems
Published 2007-01-01“…The analytical results of the equations have been obtained in terms of convergent series with easily computable components. Numerical work is given to check the efficiency of the method. …”
Get full text
Article