Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
14081
Machine Learning-Driven Optimization for Solution Space Reduction in the Quadratic Multiple Knapsack Problem
Published 2025-01-01“…Finally, we conduct comparison experiments, demonstrating that using a ML model is highly beneficial for reducing computing times and achieving rapid convergence.…”
Get full text
Article -
14082
Encoding of Variant Taxonomies in TEI
Published 2019-12-01“…These types of editions might have different goals and seek to answer different research questions, but they usually coincide in drawing attention to the importance of textual variants. To maximize the computational analysis that may be practiced with the variants in different witnesses, a complex taxonomy that reflects the diversity of cases is required. …”
Get full text
Article -
14083
Hypercalcemia, Anemia, and Acute Kidney Injury: A Rare Presentation of Sarcoidosis
Published 2015-01-01“…Further workup revealed elevated vitamin 1,25 dihydroxy level, beta-two microglobulin level, and ACE levels. Noncontrast computed tomography (CT) scan of chest showed bilateral apical bronchiectasis, but did not show any lymphadenopathy or evidence of malignancy. …”
Get full text
Article -
14084
Progress in Regenerative Dentistry Approaches: An Update
Published 2025-01-01“…Thanks to 3-D bioprinting and computer-aided design, which have revolutionized oral and maxillofacial tissue engineering, modified guided tissue regeneration procedures are gradually replacing standard surgical and nonsurgical periodontal therapy. …”
Get full text
Article -
14085
Minimizing Thermal Stress for Data Center Servers through Thermal-Aware Relocation
Published 2014-01-01“…A rise in inlet air temperature may lower the rate of heat dissipation from air cooled computing servers. This introduces a thermal stress to these servers. …”
Get full text
Article -
14086
Numerical Investigation on Pressure Pulsation Characteristics and Radial Force of a Deep-Sea Electric Lifting Pump at Off-Design Conditions
Published 2019-01-01“…To predict the vibrational conditions, the generation mechanism, and action law of pressure pulsation and radial force, a computational fluid dynamics (CFD) study of a deep-sea electric lifting pump operating under different off-design conditions was performed. …”
Get full text
Article -
14087
Foresight study for addressing megatrends in information and communication technology (ICT)
Published 2025-01-01“…Abstract Information and communications technology (ICT) encompasses the infrastructure and components that enable modern computing. In the context of Europe, the adoption of cutting-edge ICT is rapidly accelerating competitiveness, innovation, and job creation. …”
Get full text
Article -
14088
Doubling constructions and tensor product L-functions: coverings of the symplectic group
Published 2025-01-01“…We prove a basic global identity for the integral and compute the local integrals with unramified data. …”
Get full text
Article -
14089
Remarkable Differential Verbal and Non-Verbal/Performance Cognitive Profiles in Homicide and Sexual Offenders with Adult Victims
Published 2025-02-01“…The quotient ‘matrices/similarities’ (UIQ) was also computed. Results: Homicide and AVS offenders showed lower general scores than controls; AVS and homicide offenders showed lower non-verbal scores than controls; homicide offenders showed lower verbal scores than the other groups; and homicide, AVS offenders and “other inmates” were the most dissimilar groups regarding UIQ. …”
Get full text
Article -
14090
RockCloud-Align: A High-Precision Benchmark for Rock-Mass Point-Cloud Registration
Published 2025-01-01“…Extensive experiments demonstrate that the proposed method significantly outperforms existing approaches in both accuracy and computational efficiency.…”
Get full text
Article -
14091
Proactive Alleviation Procedure to Handle Black Hole Attack and Its Version
Published 2015-01-01“…The world is moving towards a new realm of computing such as Internet of Things. The Internet of Things, however, envisions connecting almost all objects within the world to the Internet by recognizing them as smart objects. …”
Get full text
Article -
14092
Modeling Human Body Using Four-Pole Debye Model in Piecewise Linear Recursive Convolution FDTD Method for the SAR Calculation in the Case of Vehicular Antenna
Published 2018-01-01“…The human exposure to EM radiation is evaluated by computing the local and whole-body average specific absorption rate (SAR) for each occupant. …”
Get full text
Article -
14093
Review on parametric building information modelling and forward design approaches for sustainable bridge engineering
Published 2025-02-01“…Furthermore, this study discussed forward design, an emerging trend that improved collaboration efficiency and cost control by establishing early computational definitions, as opposed to following traditional document-driven design methods. …”
Get full text
Article -
14094
TESLA GPUs versus MPI with OpenMP for the Forward Modeling of Gravity and Gravity Gradient of Large Prisms Ensemble
Published 2013-01-01“…Today, the use of GPUs represents a breakthrough in parallel computing, which has led to the development of several applications with various applications. …”
Get full text
Article -
14095
Innovative Approaches of Optimization Methods Used in Geothermal Power Plants: Artificial Neural Networks and Genetic Algorithms
Published 2025-01-01“…An innovative optimization method has been developed using the operational data of an ORC geothermal power plant in the city of Izmir. The computational method, using genetic algorithms with artificial neural networks as the fitness function, has identified the optimal operating conditions, achieving a 39.41% increase in net power output. …”
Get full text
Article -
14096
المستودعات الرقمية المؤسسية في الأدبيات العربية والأجنبية: مراجعة علمية
Published 2022-01-01“…Among the studies that received the largest number of research results was the role of institutional digital repositories as an important indicator to highlight this role among researchers, while the least addressed topics were topics related to the most important modern fields such as: artificial intelligence, cloud computing, augmented and virtual reality, and other topics related to importance at the moment. …”
Get full text
Article -
14097
Giant Intra-Abdominal Desmoid Tumor in a Young Male without History of Surgery, Trauma, or Familial Adenomatous Polyposis
Published 2018-01-01“…A large tumor in the abdominal cavity was detected by computed tomography, and surgical resection was performed. …”
Get full text
Article -
14098
An Upper-Ontology-Based Approach for Automatic Construction of IOT Ontology
Published 2014-04-01“…It does not only save words of format but also accurately transfers semantic data between human users and the computers. Hence, the usefulness of resources in IOT system depends on whether the domain ontology can be constructed effectively and correctly. …”
Get full text
Article -
14099
Model-Independent 3D Descriptors of Vertebral Cancellous Bone Architecture
Published 2010-01-01“…High-resolution micro computed tomography has enabled measurement of bone architecture derived from 3D representations of cancellous bone. …”
Get full text
Article -
14100
Secret sharing-based authentication and key agreement protocol for machine-type communications
Published 2019-04-01“…The comparisons regard security properties and computational and communication costs. The safety of the protocol was formally verified through simulations conducted by automated validation of internet security protocols and applications.…”
Get full text
Article