Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
13461
Adaptive Prediction of Channels with Sparse Features in OFDM Systems
Published 2013-01-01“…We also compare the proposed prediction method with the classical frequency domain method realized at each OFDM subcarrier and demonstrate that our method increases the prediction accuracy and reduces the computational complexity. Simulations on the physical channel model verify the performance of the proposed method.…”
Get full text
Article -
13462
Minage de cryptomonnaies à Irkoutsk
Published 2021-06-01“…This process of creating some digital currencies, including the bitcoin, requires significant computing power and therefore special resources. In addition to concentrating large quantities of these resources at an attractive price and a suitable climate, Irkutsk has certain socio-political characteristics that have facilitated the emergence of the activity. …”
Get full text
Article -
13463
One-Step Family of Three Optimized Second-Derivative Hybrid Block Methods for Solving First-Order Stiff Problems
Published 2024-01-01“…The proposed methods were implemented using the waveform relaxation technique, and the computed results demonstrated the superiority of these schemes over certain existing methods investigated in the study.…”
Get full text
Article -
13464
Simplified MD-LSD demapping algorithm for BICM-ID systems with multi-dimensional mappings
Published 2008-01-01“…Compared with the MD-MAX-LOG-MAP algo- rithm, the computational complexity of MD-LSD was decreased significantly. …”
Get full text
Article -
13465
Nonparametric Estimation of ATE and QTE: An Application of Fractile Graphical Analysis
Published 2011-01-01“…The proposed method has two steps: first, the propensity score is estimated, and, second, a blocking estimation procedure using this estimate is used to compute treatment effects. In both cases, the estimators are proved to be consistent. …”
Get full text
Article -
13466
Cooperative localization algorithm based on time-ofarrival in wireless senor network
Published 2019-01-01“…In this way, a fast suboptimal solution to the original problem was obtained. Finally, computer simulations show that the proposed method has lower root mean square error (RMSE) which is closer to the Cramer-Rao lower bound (CRB).…”
Get full text
Article -
13467
معرفات البیانات المترابطة والمکتبات :القصة حتى الآن
Published 2016-04-01“…Libraries around theworld appear to be embracing linked data technologies that render theircontent more accessible to both humans and computers. This paperfocuses on linked data URIs that refer to authority data. …”
Get full text
Article -
13468
Security Analysis in Wireless Sensor Networks
Published 2014-10-01“…However, security solutions in WSN differ from traditional networks due to resource limitation and computational constraints. This paper analyzes security solutions: TinySec, IEEE 802.15.4, SPINS, MiniSEC, LSec, LLSP, LISA, and LISP in WSN. …”
Get full text
Article -
13469
Analysis on network scheme and resolution test of SDN/NFV technology co-deployed in cloud datacenter
Published 2016-01-01“…Traditional datacenters have been heavily impacted due to the development and large-scale deployment of cloud computing technology.Co-deployment of SDN and NFV technology shows its distinct advantages of vitualizing network resources in the scenario of cloud datacenter.Resolution tests aiming at co-deployment of SDN and NFV have directive significance.According to the resolution test,SDN and NFV technology were matured already for the commercial deployment in operators' network.Further research needs to be focused on the key problems found out in scheme designing and the resolution test.…”
Get full text
Article -
13470
Restituer les bidonvilles de Nanterre : l’apport d’un outil de visualisation 3D à un projet de sciences sociales
Published 2021-05-01“…Researchers in urban history and sociology collaborated with computer scientists from the IGN in order to use and enrich a platform for spatialisation and visualisation of heterogeneous data to document the history of these shantytowns and to understand the formation and permanence of these places in the current collective memory.…”
Get full text
Article -
13471
Analytical Solutions of the Balance Equation for the Scalar Variance in One-Dimensional Turbulent Flows under Stationary Conditions
Published 2015-01-01“…These solutions represent both analytical tools for preliminary estimations of the concentration variance and upwind spatial reconstruction schemes for CFD (Computational Fluid Dynamics)—RANS (Reynolds-Averaged Navier-Stokes) codes, which estimate the turbulent fluctuations of reactive scalars.…”
Get full text
Article -
13472
Forward-secure ciphertext-policy attribute-based encryption scheme
Published 2014-07-01“…The results demonstrate that the proposed scheme strengthens the security of CP-ABE, without getting overmuch cost of computation and storage, and thus is more feasible for practical applications.…”
Get full text
Article -
13473
The pivotal image findings of progressive multifocal leukoencephalopathy: A case report
Published 2024-12-01“…Typically, PML appears on computed tomography scans as asymmetric focal zones of low attenuation in the periventricular and subcortical white matter, while MRI findings usually show multifocal demyelination in these areas. …”
Get full text
Article -
13474
Generalization and improvement of Nyberg-Rueppel message recovery blind signatures
Published 2005-01-01“…A generalized Nyberg-Rueppel message recovery blind signature scheme was presented,from which the scheme proposed by Camenisch et al and two new schemes could be obtained.One of these two new schemes was an efficiently improved scheme without computing any inverse while Camenisch et al’s scheme needs.Moreover,using the padding technique and hash function,a provably secure message recovery blind signature scheme,against adaptive chosen-message attack in random oracle model and generic group model,was proposed.…”
Get full text
Article -
13475
Reliability Analysis for the Gear Fracture based on Energy Release Rate Criterion
Published 2015-01-01“…The first- order second-moment method and stochastic finite element method are used to calculate the reliability. The computation results show that this suggested method has advantages of high accuracy and efficiency.…”
Get full text
Article -
13476
A Toeplitz Jacobian Matrix/Fast Fourier Transformation Method for Steady-State Analysis of Discontinuous Oscillators
Published 1995-01-01“…The TJM/FFT method substantially reduces the amount of computation and circumvents the necessary numerical differentiation for the Jacobian. …”
Get full text
Article -
13477
E-LEARNING IN PEDAGOGICAL STAFF TRAINING
Published 2016-12-01“…The ability to create, edit, share with multimedia objects of different types by using modern computer technologies will produce a beneficial effect on the formation of competence in multimedia communication.…”
Get full text
Article -
13478
Institutions sectorielles et management environnemental : une étude sur données françaises
Published 2010-05-01“…Using an OECD dataset, we compute sectoral values that grasp the environmental specificities of metallurgical, chemical, and mechanical industries. …”
Get full text
Article -
13479
Federal Income Tax Management
Published 2009-04-01“…It describes the advantages of filing a federal tax return, who must file a return, itemizing deductions, computing income tax rates, credits, payments, preparing and filing your return, recordkeeping, and where to get help. …”
Get full text
Article -
13480
Prefixes of the Fibonacci word that end with a cube
Published 2023-01-01“…We study the prefixes of the Fibonacci word that end with a cube. Using the computer prover Walnut, we obtain an exact description of the positions of the Fibonacci word at which a cube ends. …”
Get full text
Article