Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
13701
Entangled state testing in the quantum Byzantine agreement
Published 2016-11-01“…In distributed computing,Byzantine agreement is a practical method to solve its fault-tolerance problem.There is a variation of the Byzantine agreement which is called detectable Byzantine agreement.This kind of protocol is unsolvable by classical means,but can be solved using quantum resources——quantum entangled states.A typical quantum detectable Byzantine agreement is the GBKCW protocol.The part with the generation and distribution of the lists in the GBKCW protocol was dealed with.In order to keep the GBKCW protocol from the intercept-and-resend strategy,the property of the determination of entangled states were employed to test the sharing state between the parties.…”
Get full text
Article -
13702
A Modified Resource Distribution Fairness Measure
Published 2013-01-01“…An important issue of resource distribution is the fairness of the distribution. For example, computer network management wishes to distribute network resource fairly to its users. …”
Get full text
Article -
13703
A Case of Pneumothorax after Treatment with Lenvatinib for Anaplastic Thyroid Cancer with Lung Metastasis
Published 2018-01-01“…A 63-year-old man was diagnosed with multiple lung metastases from anaplastic thyroid cancer and received lenvatinib. Follow-up computed tomography on day 34 of lenvatinib treatment showed pneumothorax. …”
Get full text
Article -
13704
Modified security model based on dynamic trusted degree
Published 2008-01-01“…A modified security model based on dynamic trusted degree security model MSMBDTD(modified security model based on dynamic trusted degree) was proposed.Based on the trusted authentication and measurement of trusted computing,MSMBDTD first gave definition of trusted degree rule.Then it analyzed dynamic transformation of trusted degree in the course of system running.And also it modified access privilege of subject,which made access range be in conformance with trusted degree.Finally,after formal description and safety analysis with proof are given,MSMBDTD can support access control based on trusted degree.…”
Get full text
Article -
13705
Path Planning for Excavator Arm: Fuzzy Logic Control Approach
Published 2020-01-01“…The effectiveness of the algorithm is verified through computer simulation and real-time experiment. The simulation and experimental results show that the generated optimal path keeps the dug weight around the expected value regardless of the change of the environment.…”
Get full text
Article -
13706
Penetrating Sacral Injury with a Wooden Foreign Body
Published 2018-01-01“…This study presents a 55-year-old male admitted in our center with a 1 × 1 centimeter laceration on the sacral area skin due to a wooden penetrating object. The computed tomography (CT) of the spine revealed a hypodense penetrating object that was introduced from the posterior aspect of the sacrum into dural space and then stopped in the S1 vertebral body. …”
Get full text
Article -
13707
Kinetics and Mechanism of Oxidation of Glutamic Acid by N-Bromophthalimide in Aqueous Acidic Medium
Published 2011-01-01“…The thermodynamic parameters were computed from Arrhenius and Eyring plots. A suitable mechanism consistent with the kinetic results has been proposed.…”
Get full text
Article -
13708
Parameter-Uniform Numerical Scheme for Singularly Perturbed Delay Parabolic Reaction Diffusion Equations with Integral Boundary Condition
Published 2021-01-01“…Numerical computation for the class of singularly perturbed delay parabolic reaction diffusion equations with integral boundary condition has been considered. …”
Get full text
Article -
13709
Coupled Control Algorithm for Rotation and Revolution of Omni-directional Automated Guided Vehicle based on Mecanum
Published 2018-01-01“…The theoretical analysis,computer simulation and experiments prove the effectiveness of the proposed algorithm. …”
Get full text
Article -
13710
AN IMPROVED FUZZY K-MEANS CLUSTERING ALGORITHM BASED ON WEIGHT ENTROPY MEASUREMENT AND CALINSKI-HARABASZ INDEX
Published 2018-07-01“…Clustering plays an important role in data mining and is applied widely in fields of pattern recognition, computer vision, and fuzzy control. In this paper, we proposed an improved clustering algorithm combined of both fuzzy k-means using weight Entropy and Calinski-Harabasz index. …”
Get full text
Article -
13711
Symmetry Reductions of (2 + 1)-Dimensional CDGKS Equation and Its Reduced Lax Pairs
Published 2014-01-01“…With the aid of symbolic computation, we obtain the symmetry transformations of the (2 + 1)-dimensional Caudrey-Dodd-Gibbon-Kotera-Sawada (CDGKS) equation by Lou’s direct method which is based on Lax pairs. …”
Get full text
Article -
13712
Algorithm for the cloud service workflow scheduling with setup time and deadline constraints
Published 2015-06-01“…Cost minimization with deadline constraints and setup time is a new resource allocation optimization problem in cloud computing.An integer programming model is constructed for this NP-hard problem.A novel probability model and updating mechanism is suggested for sampling the solution space.A heuristic method is investigated for generating good initial population.A hybrid estimation of distribution algorithm (HEDA) is proposed for the considered problem.The global best solution is adopted to balance the diversification and intensification of HEDA.Experimental results show that the proposed method is effective to optimize the workflow running cost within reasonable CPU time.…”
Get full text
Article -
13713
Application of Tchebichef moment in image watermarking techniques
Published 2003-01-01“…The geometric distortions are produced by Strimark. The computer simulation results show that the proposed method has a good robustness to Strimark and can be used in any domain. …”
Get full text
Article -
13714
Reward signals in the motor cortex: from biology to neurotechnology
Published 2025-02-01“…In this Perspective, we highlight the functional roles of M1 reward signals and propose how they could guide advances in neurotechnologies for movement restoration, specifically brain-computer interfaces and non-invasive brain stimulation. …”
Get full text
Article -
13715
Dynamics of inclined CNTRC sandwich beams under a moving mass with influence of CNT agglomeration
Published 2023-11-01“…Dynamic response is computed for a simply supported beam by Newmark method. …”
Get full text
Article -
13716
Borromean states in a one-dimensional three-body system
Published 2025-01-01“…Within the framework of the Faddeev equations, the three-body spectrum and the corresponding wave functions are computed numerically. In addition, we identify the parameter-space region for the two-body interaction, where the Borromean states occur, evaluate their geometric properties, and investigate their dependence on the mass ratio.…”
Get full text
Article -
13717
Architecture design of multi-protocol controller based on software definition
Published 2020-10-01“…In order to fulfill the requirement of high-performance computing system for software definition interconnected communication,a kind of multi-protocol controller architecture was designed.The architecture supported a variety of protocol specifications and software-defining heterogeneous architecture.The interconnections of Fiber Channel,Ethernet and SRIO were realized by embedding programmable hardware circuits.The work mode of multi-protocol controllers was managed by software definition,which meet the heterogeneous requirements of system applications.The multi-protocol controller of the thesis has been realized in the 40 nm process,that the measurements show that the performance and function satisfy the standard of the three protocols.…”
Get full text
Article -
13718
On the Statistical Properties of Nakagami-Hoyt Vehicle-to-Vehicle Fading Channel under Nonisotropic Scattering
Published 2012-01-01“…A simulator that uses the inverse-fast-fourier-transform- (IFFT-) based computation method is designed for this model. The simulator and analytical results are compared.…”
Get full text
Article -
13719
Multiplicative reduced bases for hyperelasticity
Published 2024-07-01“…The method is naturally derived from a fully consistent variational setting and we establish an upper bound of the error in the energy norm. From a computational standpoint, the approach achieves efficient Kolmogorov $n$-width decay when very large rotations and incompressibility are involved.…”
Get full text
Article -
13720
Flatness-based control revisited: The HEOL setting
Published 2024-11-01“…They are illustrated via some computer simulations.…”
Get full text
Article