Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
13721
Digital research and implementation of cloud-network planning of telecom operators
Published 2022-11-01“…Based on the perspective of digital transformation of telecom operators, a data-driven cloud-network development planning system was proposed systematically, six key digital capabilities were built, and a cloud-network planning digital platform was designed and implemented, which could be used for scenarios such as fine planning of target networks, accurate prediction of edge computing, etc., and the application prospects of digital twins in the field of future cloud-network planning were discussed.The proposed system has guiding and reference significance for operators to promote cloud-network integration strategies and promote high-quality development.…”
Get full text
Article -
13722
The analysis of influence of uncertainty factors on mathematical modeling of the process of reverse expansion of ammonia in low-speed reciprocating compressor stage. Part 2
Published 2022-06-01“…Based on the results of the computational and parametric analysis, the applicability of known methods for calculating the heat transfer coefficient to the object under consideration is evaluated.…”
Get full text
Article -
13723
Novel extended multivariate public key cryptosystem
Published 2014-04-01“…Analysis results demonstrate that the extended cryptosystem inherits the merit of MI, i.e. efficient computation. Meanwhile, the novel extended scheme can also resist linearization attack, differential attack and algebraic attack.…”
Get full text
Article -
13724
Metamodel-Based Multidisciplinary Design Optimization of a Deep-Sea Manganese Nodules Test Miner
Published 2012-01-01“…Metamodels such as the kriging model and the response surface model are employed to reduce computational costs for MDO and to integrate component systems in a design framework. …”
Get full text
Article -
13725
SELF-SIMILARITY IN PITCH ORGANIZATION
Published 2011-06-01“…Also, we will investigate the author’s self-similar, non-octave-based, and full-chromatic mode of twenty-three notes, which led to the author’s compositions, such as Chaconne for guitar solo (1999), Fractus III for percussion and computer (2001), and Point. Line. Spot for string orchestra (2003). …”
Get full text
Article -
13726
One More Thing on the Subject: Generating Chaos via <i>x</i>|<i>x</i>|<sup><i>a</i>−1</sup>, Melnikov’s Approach Using Simulations
Published 2025-01-01“…A much broader Web-based application for scientific computing will incorporate this as a key component.…”
Get full text
Article -
13727
Power Control Algorithm Based on Normalized Utility Function Research
Published 2014-12-01“…Simulation results show that the algorithm is not restricted by system modulation mode, and reduces the computational complexity, and has faster convergence speed. …”
Get full text
Article -
13728
Topological 1D gravity, KP hierarchy, and orbifold Euler characteristics of M‾g,n
Published 2025-03-01“…As an application, we present two types of algorithms to compute the orbifold Euler characteristics of the moduli spaces M‾g,n of stable curves. …”
Get full text
Article -
13729
Method of dynamic integrity measurement for VMM based on adjacency data
Published 2015-09-01“…Due to its high privilege and complicated runtime memory,dynamic integrity measurement for VMM (virtual machine monitor) was always a great difficulty in the current study.An innovative method based on the adjacency data was proposed,which used a neighbor as the host of a measurement module.According to an integrity model in memory page granularity and a new improved measurement algorithm,dynamic integrity measurement for VMM was imple-mented.Experimental data shows it could detect the integrity broken accurately,only causing a moderate performance loss for computing intensive tasks.…”
Get full text
Article -
13730
A novel frequency-domain IQ imbalance estimation and compensation algorithm
Published 2016-08-01“…To solve the problem of deterioration of system performance for the RF front-end distortion and IQ imbalance in orthogonal frequency division multiplexing(OFDM)system,a novel IQ imbalance frequency domain estimation and compensation algorithm was proposed.The effect of channel could be offset,the complexity of algorithm could be reduced and the implemention conld be achieved easily using two different pilot signals on one sub-carrier.The simulation results show that the algorithm not only greatly reduces the computational complexity,but also gets a better estimation and compensation performance,and the performance is better than traditional algorithms.…”
Get full text
Article -
13731
The effect of porosity on fragmentation statistics of dynamically loaded ZrO2 ceramics
Published 2018-01-01“…Experimental data processing showed that the shape of stress-strain curves, the fragment size distribution and distribution of time intervals between the fractoluminiscense impulses depend on the sample porosity and load intensity. The X-ray Computed Tomography (CT) study of porous material structures allowed us to link the fragmentation statistics with pronounced porosity clustering (about 97% of the total pore volume) formed due to sintering…”
Get full text
Article -
13732
Minimum-cost network hardening algorithm based on stochastic loose optimize strategy
Published 2015-01-01“…To construst a minimum-cost network hardening (MCNH) scheme in large-scale network,a stochastic loose optimize strategy based algorithm (MCNHA-SLOS) was proposed,and its effectiveness was analyzed.MCNHA-SLOS was a near-optimal approximation algorithm,which could achieve iterative computations in the array of sparse spaces of the whole plan space,so that the near-optimal scheme must exist in the low cost plan space.Instantiation analysis and experimental results show that the MCNHA-SLOS algorithm to be efficient,precision controllable and asymptotically optimal,and thus very applicable for large-scale network.…”
Get full text
Article -
13733
Solitary Neurofibroma of the Frontal Sinus
Published 2012-01-01“…A 28-year-old male presented with forehead swelling and computed tomography images revealed a tumor involving the left frontal sinus. …”
Get full text
Article -
13734
Review of Neurobiologically Based Mobile Robot Navigation System Research Performed Since 2000
Published 2016-01-01“…The main focus is to explore the functionality of the cognitive maps developed in these mobile robot systems with respect to route planning, as well as a discussion/analysis of the computational complexity required to scale these systems.…”
Get full text
Article -
13735
A High-Performance Parallel FDTD Method Enhanced by Using SSE Instruction Set
Published 2012-01-01“…The benchmarks of the SSE acceleration on both the multi-CPU workstation and computer cluster have demonstrated the advantages of (vector arithmetic logic unit) VALU acceleration over GPU acceleration. …”
Get full text
Article -
13736
Research on formal security policy model specification and its formal analysis
Published 2006-01-01“…Formal method is one of the kernel technologies of developing high security level computer system.But by current formal development method,assurance of security policy model correctness cannot be provided directly using machine proof which is stricter than manual proof,correspondence between security policy model and security functional specification is also hard to achieve.To solve these problems,a new and effective method was proposed for specification constructing and proving by extending the specification technique of security functional specification into the specifica-tion of security policy model.Also,BLP model was specified and analyzed as an example.…”
Get full text
Article -
13737
An Unusual Presentation of Congenital Lobar Emphysema
Published 2017-01-01“…Chest radiograph findings lead to the suspicion of congenital lobar emphysema, which was then confirmed by a computed tomography (CT) scan. This condition is most commonly identified in newborns, with very few cases being reported in adults. …”
Get full text
Article -
13738
Caseous Necrosis of Mitral Annulus
Published 2015-01-01“…Echocardiography is the first choice of imaging in evaluation. Cardiac computed tomography (CT) is helpful in establishing diagnosis by showing dense calcifications while cardiac magnetic resonance imaging (MRI) is used primarily as a problem solving tool. …”
Get full text
Article -
13739
Explaining IT programming concepts using NSM explications: The case of ‘variable’ and ‘constant’
Published 2019-12-01“… The paper seeks to explore a practical application of Natural Semantic Metalanguage in defining two core concepts in computer programming, i.e. the concept of a variable and the concept of a constant. …”
Get full text
Article -
13740
Electromagnetic Gyroscopic Motion
Published 2012-01-01“…A geometric interpretation of motion will be given in terms of Euler’s angles (θ,ψ,ϕ). Computer programs are carried out to integrate the attained quasilinear autonomous system using a fourth-order Runge-Kutta method. …”
Get full text
Article