Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
13041
Positive Solutions for Coupled Nonlinear Fractional Differential Equations
Published 2014-01-01“…By constructing two cones K1, K2 and computing the fixed point index in product cone K1×K2, we obtain that the system has a pair of positive solutions. …”
Get full text
Article -
13042
Remarks on the $L^p$ convergence of Bessel–Fourier series on the disc
Published 2023-10-01“…After discussing the classical Fourier series on the 2-torus, we move onto the disc, whose eigenfunctions are explicitly computable as products of trigonometric and Bessel functions. …”
Get full text
Article -
13043
Efficient Iterative Methods with and without Memory Possessing High Efficiency Indices
Published 2014-01-01“…Numerical examples and comparison with the existing methods are included to confirm theoretical results and high computational efficiency.…”
Get full text
Article -
13044
Metallic transports from accelerating black holes
Published 2025-01-01“…The DC conductivity in the boundary QFT is enhanced due to the effects of black hole acceleration in the bulk counterpart. We further compute resistivity in different temperature regime, which reveals a new quantum liquid phase with dynamic critical exponent z = 3.…”
Get full text
Article -
13045
A subtraction scheme for massive QED
Published 2020-01-01“…As an application we discuss the computation of the next-to-next-to-leading order QED corrections to the muon decay and present differential results with full electron mass dependence.…”
Get full text
Article -
13046
On approximation of the solutions of delay differential equations by using piecewise constant arguments
Published 1991-01-01“…EPCA are strongly related to some discrete difference equations arising in numerical analysis, therefore the results can be used to compute numerical solutions of delay differential equations. …”
Get full text
Article -
13047
Finding Global Minima with a Filled Function Approach for Non-Smooth Global Optimization
Published 2010-01-01“…At last, a numerical test is made. The computational results demonstrate that the proposed approach is effcient and reliable.…”
Get full text
Article -
13048
Convergence Analysis of Parallel S-Iteration Process for System of Generalized Variational Inequalities
Published 2017-01-01“…Numerical example illustrates that the proposed parallel S-iteration process has an advantage over parallel Mann iteration process in computing altering points of some mappings.…”
Get full text
Article -
13049
Parameter Estimation on a Stochastic SIR Model with Media Coverage
Published 2018-01-01“…In order to reduce the computational load, the Newton-Raphson algorithm and Markov Chain Monte Carlo (MCMC) technique are incorporated with maximum likelihood estimation. …”
Get full text
Article -
13050
Rapid video copy detection on compressed domain
Published 2009-01-01“…To reduce the detection time efficiency under large scale data environment, a rapid algorithm was proposed on compressed domain using a two-level hierarchical detection scheme.The ordinal measures of DCT coefficients were adopted as visual features for similarity-matching in order to reduce the computational load in video decoding.Inverted indexing structure was used to accelerate the first level detection process.The experiment results show, compared with the previous algorithm, the algorithm can improve the detection speed obviously with the similar detection precision.…”
Get full text
Article -
13051
An Improved Algorithm for TD-LTE Downlink Time Synchronization
Published 2015-01-01“…It utilizes statistical energy difference and correlation of cyclic prefix to improve the system performance, which reduces the computational complexity, and can detect the cyclic prefix types. …”
Get full text
Article -
13052
Research of composite safety protection for digital maps
Published 2016-02-01“…In order to preserve topology of map effectly by the large embedding rates and protect the safety of watermarking scenario, a gray balance means was provided, and the maximum capacity in each divided rectangle blocks in the electronic charts was computed.The experiment also shows that it can adapt to data perturbation by conventional operations.The method has better robustness.…”
Get full text
Article -
13053
The Improved Riccati Equation Method and Exact Solutions to mZK Equation
Published 2012-01-01“…The method appears to be easier and more convenient by means of a symbolic computation system. Of course, it is also effective to solve other nonlinear evolution equations in mathematical physics.…”
Get full text
Article -
13054
A mathematical model for antibiotic control of bacteria in peritoneal dialysis associated peritonitis
Published 2014-08-01“…Using the model along with experimental data, clinical parameters, and physiological values, we compute variations in PD fluid distributions, drug concentrations, and number of bacteria in peritoneal and extra-peritoneal cavities. …”
Get full text
Article -
13055
Efficient Procedures of Sensitivity Analysis for Structural Vibration Systems with Repeated Frequencies
Published 2013-01-01“…Numerical examples show that it is easy to implement the computational procedure, and the method presented in this paper is efficient for the general linear vibration damped systems with repeated frequencies.…”
Get full text
Article -
13056
New key management scheme of wireless sensor networks based on key relation table
Published 2006-01-01“…Aimed at some security properties on key management for multicast such as forward confidentiality,backward confidentiality,resisting conspiracy-analysis,expansibility and robustness,and furthermore the obvious character of en-ergy-constraint,a new key management scheme based on threshold mechanism & key relation table was proposed,which mapped keys’ value onto the three-dimensional curves and surfaces.Although computing complexity increases within a little scale,the performance optimization of memory complexity as well as communication complexity were proposed.…”
Get full text
Article -
13057
Intraosseous Lipomatous Meningioma
Published 2015-01-01“…A 49-year-old man with intermittent headaches and right sided parietal lump was found to have an intraosseous right parietal lesion on computed tomography (CT) and magnetic resonance imaging (MRI). …”
Get full text
Article -
13058
RFID – Making It So…With Some Help From the University of Florida
Published 2005-10-01“…Briefly, modern passive RFID involves “smart” labels, readers and associated transmitting and receiving antennas, and back-end computer control and database management systems. Figure 1 gives examples of typical RFID components. …”
Get full text
Article -
13059
Technology of the information and communication in public and private schools in Arequipa
Published 2015-01-01“…The most frequent ICTs were the computer, television, DVD player, radio and internet.…”
Get full text
Article -
13060
Case Report: Leaflet thrombosis after transcatheter valve-in-valve aortic valve replacement in prosthetic valve endocarditis
Published 2025-02-01“…This resulted in early death due to myocardial infarction and acute heart failure. A computed tomography revealed subclinical leaflet thrombosis. …”
Get full text
Article