Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
13021
Nerve root compression caused by intraspinal gas accumulation. A case report
Published 2019-09-01“…The diagnosis was confirmed only by computed tomography findings. …”
Get full text
Article -
13022
Le Online Dating, au cœur de la communication électronique
Published 2012-05-01“…For fifteen years, sexual and sentimental relationships « assisted by computers » has became a kind of relationnal revolution. …”
Get full text
Article -
13023
S-Vivaldi:a space repairing based Internet delay space embedding algorithm
Published 2012-03-01“…To counteract TIV’s influence on the Internet delay space models,an Internet delay space embedding algorithm based space repairing S-Vivaldi (scaling-Vivaldi) was proposed.S-Vivaldi firstly applied an exponent transformation on the delay matrix D,retrieved a matrix D'almost without TIV,and then embedded D'by the Vivaldi algorithm.The delay between any two nodes could be computed by a series of inverse transformation.Experimental results show that S-Vivaldi could improve the prediction accuracy apparently in the most case.…”
Get full text
Article -
13024
Error-parameter analysis based blind identification and super-resolution restoration algorithm
Published 2009-01-01“…If motion estimation was inaccurate, searching algorithm could be combined with error-parameter analysis to reduce computation cost. Stimulation results demonstrate the effectiveness of the new implementation scheme and blur identification.…”
Get full text
Article -
13025
Protocols for Robotic Telescope Networks
Published 2010-01-01“…This paper is addressed to astronomers who are not specialists in computer science. We give explanations of some basic and advanced protocols to receive events and how to implement them in a robotic observatory software. …”
Get full text
Article -
13026
Investigation of Patients with Apparently Inoperable Lung Cancer
Published 1996-01-01“…These results demonstrate that chest x-ray and computed tomography of the chest may not be specific enough to rule out the possibility of surgical cure.…”
Get full text
Article -
13027
Two-loop amplitudes for O α s 2 $$ \mathcal{O}\left({\alpha}_s^2\right) $$ corrections to Wγγ production at the LHC
Published 2024-12-01“…We employ a compact system of integration-by-part identities provided by the NeatIBP package, allowing for an efficient computation of the rational coefficients of the scattering amplitudes over finite fields.…”
Get full text
Article -
13028
Emphysematous Aortitis due to Clostridium septicum in an 89-Year-Old Female with Ileus
Published 2019-01-01“…This condition was found incidentally on computed tomography of the chest during the evaluation of a patient presenting with pneumonia coincident with adynamic ileus. …”
Get full text
Article -
13029
Existence and Multiplicity of Solutions to Discrete Conjugate Boundary Value Problems
Published 2010-01-01“…By classifying the linear systems, we define index functions and obtain some properties and the concrete computation formulae of index functions. Then, some new conditions on the existence and multiplicity of solutions are obtained by combining some nonlinear analysis methods, such as Leray-Schauder principle and Morse theory. …”
Get full text
Article -
13030
Efficient method of constructing parameters in R-ate paring
Published 2010-01-01“…In order to accelerate the computing of Tate paring, a new technique of selection method of parameters (A,B) based on R-ate technique had been proposed. …”
Get full text
Article -
13031
Application of blockchain in telecom operators
Published 2020-05-01“…Blockchain is another disruptive technological revolution after the IoT,cloud computing and big data.Blockchain technology and typical application cases were firstly introduced,and then the role of blockchain technology and blockchain in operators were analyzed.Secondly,combined with the characteristics of the blockchain,the application of blockchain in multiple operators were focused on,such as infrastructure,international roaming settlement,digital points issuance and trading,data storage,cross-border payment,identity verification,and credit reporting.Finally,the challenges faced by operators in the comprehensive application of blockchain were introduced.…”
Get full text
Article -
13032
The Noise Performance of a Multiple-Input-Port and Multiple-Output-Port Low-Noise Amplifier Connected to an Array of Coupled Antennas
Published 2011-01-01“…A definition of the noise figures and natural noise figures of a MIPMOP device is provided, and the resulting properties are detailed in the impedance and admittance representations. We compute the natural noise figures of a low-noise MIPMOP amplifier comprising a MIMO series-series feedback amplifier (MIMO-SSFA), designed for a wireless receiver front-end.…”
Get full text
Article -
13033
A lightweight and trusted communication protocol for IoT
Published 2021-11-01“…With the era of the internet of things (IoT), the protocol stack conversion scheme based on the application-layer’s gateway has problems such as poor performance and end to end security that can’t be guaranteed.A lightweight and trusted IoT IP communication protocol was proposed, which was the main research direction of Protocol and Interface Group in Network 5.0 Industry and Technology Innovation Alliance, the deployment costs of protocol conversion gateways was decreased, the computing and storage overhead of IoT devices was reduced, and end to end communication security was ensured.…”
Get full text
Article -
13034
An Algorithm to Select the Optimal Program Based on Rough Sets and Fuzzy Soft Sets
Published 2014-01-01“…In this algorithm, firstly, according to fuzzy soft sets, we build up information systems; secondly, we compute the significance of each parameter according to rough set theory; thirdly, combining subjective bias, we give an algorithm to obtain the comprehensive weight of each parameter; at last, we put forward a method to choose the optimal program. …”
Get full text
Article -
13035
The dangerous biology of pathogenic germs
Published 2024-09-01“…The convergence of biotechnologies with other disciplines, including computer science and Artificial Intelligence (AI), may make it possible to carry out dangerous genetic manipulations on pathogenic germs, as the gain-of-function experiments exacerbating virulence, as those carried out on myxoviruses and coronaviruses. …”
Get full text
Article -
13036
An interesting family of curves of genus 1
Published 2000-01-01“…In the former case, all integral solutions are determined; in the latter case, computation in the range 1≤t≤999 shows large ranks are common, giving a particularly simple example of curves which (admittedly over a small range) apparently contradict the once held belief that the rank under specialization will tend to have minimal rank consistent with the parity predicted by the Selmer conjecture.…”
Get full text
Article -
13037
On Generalized Topological Indices of Silicon-Carbon
Published 2020-01-01“…Let Gbe a graph with n vertices and Γu be the degree of its u-th vertex (Γx is the degree of u). In this article, we compute the generalization of Zagreb index, the generalized Zagreb index, the first and second hyper F-indices, the sum connectivity F-index, and the product connectivity F-index graphs of Si2C3−Ip,q, Si2C3−IIp,q, Si2C3−IIIp,q, and SiC3−IIIp,q.…”
Get full text
Article -
13038
On the Characterization of a Class of Difference Equations
Published 2011-01-01“…To examine the asymptotic behavior of solutions, we compute the spectra of operators which correspond to such type of difference equations. …”
Get full text
Article -
13039
Gesture recognition approach based on learning sparse representation
Published 2013-06-01“…This method operated directly on the original acceleration signals by sparse representation without feature extraction and used the class-specific dictionary learning for sparse modeling to reduce the computing cost and time of recognition. The proposed system can easily add a novel gesture category as well as remove existing ones. …”
Get full text
Article -
13040
Research on a Mobile Malicious Code Management and Control Method Based on Cloud-Pipeline-Terminal
Published 2013-08-01“…In order to solve the increasingly serious security issues caused by malwares in mobile internet,a“cloud-pipeline-terminal”model was proposed to implement detection and killing of mobile internet malwares.The proposed model composes of a cloud computing platform to support the analysis and measurement of the malwares and to implement strategy distribution and management of the system,a monitoring and intercepting system on the side of mobile communication pipelines and a terminal security application to check and kill the malwares.The purpose is to build a safe and harmonious mobile internet environment.…”
Get full text
Article