Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
12981
Solution of a Scalar Two-Dimensional Nonlinear Diffraction Problem for Objects of Arbitrary Shape
Published 2024-01-01“…The problem was solved for different bodies with the use of various computational grids. Convergence graphs of the iterative processes were generated. …”
Get full text
Article -
12982
Wave Dispersion and Attenuation in Viscoelastic Split Hopkinson Pressure Bar
Published 1998-01-01“…A method, based on the spectral analysis of wave motion and using measured wave signals along the split Hopkinson pressure bar, is developed for the correction of the dispersion and attenuation of viscoelastic waves. Computational simulations are performed to show the feasibility of the method.…”
Get full text
Article -
12983
Optimization of Gain, Impedance, and Bandwidth of Yagi-Uda Array Using Particle Swarm Optimization
Published 2008-01-01“…It is a global optimization technique-like genetic algorithm (GA) but has less computational cost compared to GA. In this paper, PSO has been used to optimize the gain, impedance, and bandwidth of Yagi-Uda array. …”
Get full text
Article -
12984
The use of technical vision in flexible production systems to determine coordinates of randomly located objects
Published 2023-06-01“…The article is devoted to the development of an object recognition algorithm using technical vision using Python and the OpenCV computer vision library. The article presents a program that allows you to set the coordinates of an object arbitrarily located in the field of view of the camera, as well as determine its orientation. …”
Get full text
Article -
12985
Attribute-based encryption supporting arbitrary conjunctive key word search
Published 2016-08-01“…A new searchable encryption scheme was proposed in prime order bilinear groups based on the attribute-based encryption and polynomial equation.The scheme,in which each conjunctive-keyword ciphertext can be searched by a number of users,may significantly reduce the overhead of network and sending nodes' computation in the application of fine-grained access control.Meanwhile,the scheme facilitates the flexibility of conjunctive search by supporting arbitrary conjunctive search of the keywords.At last,the performance was analyzed and compared with some recent conjunctive search schemes.…”
Get full text
Article -
12986
Evaluating and upgrading the performance of a bridge network structure with Rayleigh distribution lifetimes.
Published 2025-01-01“…Finally, we analyze comprehensively a computer simulation example to distingue between the methods. …”
Get full text
Article -
12987
Differential resolvents of minimal order and weight
Published 2004-01-01“…We will then give an upper bound on the weight of an α-resolvent of smallest possible weight. We will then compute the indicial equation, apparent singularities, and Wronskian of the Cockle α-resolvent of a trinomial and finish with a related determinantal formula.…”
Get full text
Article -
12988
Credit Risk Evaluation with a Least Squares Fuzzy Support Vector Machines Classifier
Published 2014-01-01“…In the proposed LS-FSVM model, the purpose of incorporating the concepts of fuzzy sets is to add generalization capability and outlier insensitivity, while the least squares method is adopted to reduce the computational complexity. For illustrative purposes, a real-world credit risk dataset is used to test the effectiveness and robustness of the proposed LS-FSVM methodology.…”
Get full text
Article -
12989
Maximum Independent Sets Partition of (n,k)-Star Graphs
Published 2019-01-01“…The (n,k)-star graph is a very important computer modelling. The independent number and chromatic number of a graph are two important parameters in graph theory. …”
Get full text
Article -
12990
Neurocysticercosis. Case report.
Published 2009-05-01“…The physical examination showed postictal confusion, without neurological deficit, neck rigidity or peripheral edema. Computer axial tomography was definitive for neurocysticercosis disgnosis. …”
Get full text
Article -
12991
∆E/∆E Measurements of Energetic Ions Using CVD Diamond Detectors
Published 2018-01-01“…Experimental and computational results of a ΔE/ΔE diamond detection system are presented. …”
Get full text
Article -
12992
The Approximate Solution of Fredholm Integral Equations with Oscillatory Trigonometric Kernels
Published 2014-01-01“…Due to the highly oscillatory kernels of integral equation, the discretised collocation equation will give rise to the computation of oscillatory integrals. These integrals are calculated by using recursion formula derived from the fundamental recurrence relation of Chebyshev polynomial. …”
Get full text
Article -
12993
Fusion of IDC Operation Support System Design and Analysis
Published 2013-01-01“…By the establishment of IDC space, network, cloud computing various levels of resource element model, fusion process, data, operation and service, a standard, and loosely coupled IT support fusion architecture was designed and built, which laid the foundation for IDC intensive operation. …”
Get full text
Article -
12994
Modeling of influence of cooled and uncooled rolls on temperatures and stresses of the industrial ingot surface in the area of the secondary cooling
Published 2003-08-01“…On the basis of the system “ProNRS-2'' there are carried out the computer calculations of tensile and compressive stresses along the length of the ingot of size 250x300 mm for the group of industrial steels. …”
Get full text
Article -
12995
Unravelling AdS3/CFT2 near the boundary
Published 2025-01-01“…By restricting the path integral to only include worldsheets which live near the asymptotic boundary, we compute correlation functions of spectrally-flowed vertex operators and find a precise agreement with the perturbative correlators in the recently-proposed dual CFT at all orders in conformal perturbation theory. …”
Get full text
Article -
12996
3D Printing Errors Detection During the Process
Published 2024-06-01“…A widely used solution for monitoring the printing process involves employing a webcam to observe the process in real time, either alerting the operator or halting the print if an issue is detected. In this paper, a computer vision algorithm able to detect specific errors is proposed.…”
Get full text
Article -
12997
Poisson Denoising for Astronomical Images
Published 2018-01-01“…The cluster centers are used for chromatic components to improve the computational efficiency. For videos, the information of both spatial and temporal correlations improves the denoising. …”
Get full text
Article -
12998
Fast mode selection of intra prediction algorithm based on spatial and frequency analysis
Published 2012-07-01“…By using of the features of DCT coefficients in frequency domain and the correlation of the predictive mode in spatial domain,the proposed algorithm evaluated the complexity of encoding block and selected encoding block size firstly,computed the texture direction and pre-selected most possibly prediction mode of 16×16 block secondly,and then got the neighbor block’s optimum mode and narrowed mode selection range of 4×4 block.The experiments show that,compared with existing algorithms,in the case of almost equal quality,the speed of the algorithm is significantly improved.…”
Get full text
Article -
12999
The difference vectors for convex sets and a resolution of the geometry conjecture
Published 2021-07-01“…Comments on the numerical computation of the quantities involved are also presented.…”
Get full text
Article -
13000
Positive Solutions for BVP of Fractional Differential Equation with Integral Boundary Conditions
Published 2020-01-01“…It is worth mentioning that these iterative sequences start off with zero function or linear function, which is useful and feasible for computational purpose. An example is also included to illustrate the main result of this paper.…”
Get full text
Article