Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
15321
Kernel Method Based Human Model for Enhancing Interactive Evolutionary Optimization
Published 2015-01-01“…A fitness landscape presents the relationship between individual and its reproductive success in evolutionary computation (EC). However, discrete and approximate landscape in an original search space may not support enough and accurate information for EC search, especially in interactive EC (IEC). …”
Get full text
Article -
15322
Distance-Based Fractional Dimension of Certain Wheel Networks
Published 2024-01-01“…The metric dimension has a wide range of applications in the field of computer science such as integer programming, radar tracking, pattern recognition, robot navigation, and image processing. …”
Get full text
Article -
15323
Optimizing Thermal Efficiency of Building Envelopes with Sustainable Composite Materials
Published 2025-01-01“…The research methodology involves an extensive review of 125 relevant studies to assess the thermal performance of these materials. U-values were computed from the reported thermal conductivity data and systematically arranged in chronological order to evaluate and compare their insulation effectiveness over time. …”
Get full text
Article -
15324
Control of Discrete Event Systems by Means of Discrete Optimization and Disjunctive Colored PNs: Application to Manufacturing Facilities
Published 2014-01-01“…The resulting tools produce excellent results in certain cases; however, the NP-hard nature of many discrete control or decision making problems in the manufacturing area may require unaffordable computational resources, constrained by the limited available time required to obtain a solution. …”
Get full text
Article -
15325
Optimization of IoT-Based Sporting Goods Consumer Service Management System
Published 2021-01-01“…With the rapid development of computer technology and information industry technology, the use of these technologies has been deeply applied to the management of various industries. …”
Get full text
Article -
15326
Monte Carlo simulation methods-based models for analyzing the kinetics of drug delivery from controlled release systems
Published 2025-01-01“…Based on this evidence, we propose their potential application in the characterization of new drug-controlled release systems, synergy with other computational methods, and their capability to be adapted for in vivo or in vitro kinetic analysis.…”
Get full text
Article -
15327
Research on temperature detection method of liquor distilling pot feeding operation based on a compressed algorithm
Published 2024-06-01“…At the same time, in order to effectively reduce the occupancy of the computational resources and improve the deployment performance, this study established infrared image dataset of fermented grains surface, and fused the YOLO v5n and the knowledge distillation and the model pruning algorithms, and an lightweight method YOLO v5ns-DP was proposed as as a model for detecting temperature changes in the surface layer of fermented grains during the process of feeding the distilling. …”
Get full text
Article -
15328
Numerical Investigation of Laminar Natural Convection in Inclined Square Enclosure with the Influence of Discrete Heat Source
Published 2015-01-01“…Natural convection heat transfer in a two-dimensional square enclosure at various angles of inclination is investigated numerically using a finite volume based computational procedure. The heat transfer is from a constant temperature heat source of finite length centred at one of the walls to the cold wall on the opposite side while the remaining walls are insulated. …”
Get full text
Article -
15329
Metastatic Cerebellar Gastrointestinal Stromal Tumor with Obstructive Hydrocephalus Arising from the Small Intestine: A Case Report and Review of the Literature
Published 2014-01-01“…Following abdominal surgery, left hemiparesis and consciousness disturbance were noted. Computed tomography showed recurrent large tumor with perifocal edema in the right frontal lobe of the brain. …”
Get full text
Article -
15330
Approach for designing and modelling of nanoscale DG MOSFET devices using Kriging metamodelling technique
Published 2017-11-01“…The elaboration of such models is made possible through the generation of computer experiments using ATLAS‐2D simulator, where the numerical simulations or experimental measurements, account for the accurate behaviour of the device including the ageing phenomena, short channel and quantum confinement effects. …”
Get full text
Article -
15331
Bifurcation of a Fractional-Order Delayed Malware Propagation Model in Social Networks
Published 2019-01-01“…To check the correctness of theoretical analyses, we carry out some computer simulations. At last, a simple conclusion is drawn. …”
Get full text
Article -
15332
Using Protein Painting Mass Spectrometry to Define Ligand Receptor Interaction Sites for Acetylcholine Binding Protein
Published 2025-01-01“…This strategy can be used with computational structural modeling to identify binding regions involved in drug targeting at the nAChR.…”
Get full text
Article -
15333
Climate Predictions: The Chaos and Complexity in Climate Models
Published 2014-01-01“…Occurrence of chaos in computing the environmental interface temperature from the energy balance equation given in a difference form is pointed out. …”
Get full text
Article -
15334
A Novel Technique for Handwritten Signature Recognition
Published 2024-12-01“…Experiments, conducted on a personal computer equipped with an NVIDIA Quadro M1200 GPU, an Intel i7 processor, and 32 GB of RAM, demonstrated the model’s exceptional performance, achieving validation accuracies of 99.60% on the MCYT-75 dataset and 99.80% on the GPDS-300 dataset. …”
Get full text
Article -
15335
A Simple Polarization-Based Fringe Projection Profilometry Method for Three-Dimensional Reconstruction of High-Dynamic-Range Surfaces
Published 2024-12-01“…Three-dimensional (3D) reconstruction of high-dynamic-range (HDR) surfaces plays an important role in the fields of computer vision and image processing. Traditional 3D measurement methods often face the risk of information loss when dealing with surfaces that have HDR characteristics. …”
Get full text
Article -
15336
Analysis of high-rise building safety detection methods based on big data and artificial intelligence
Published 2020-06-01“…The experiments in this article use the concept of big data to divide the system into modules such as data collection, data preprocessing, feature extraction, prediction model building, and model application in order to provide massive data storage and parallel computing services to form a security test system. …”
Get full text
Article -
15337
Hierarchical Clustering for Anomalous Traffic Conditions Detection in Power Substations
Published 2019-11-01“…For example, in the field of security, several academic works have shown that the same attacks used in computer networks (DoS, Sniffing, Tampering, Spoffing among others), can also compromise the operation of a substation. …”
Get full text
Article -
15338
Analysis of the Evacuation Capacity of Parallel Double Running Stairs in Different Merging Form Based on Simulation
Published 2018-01-01“…The stairs evacuation capacity is related to the evacuation time and the robustness of stairs, and the evacuation time can be calculated by using the improved agent-based model based on computer simulation. The robustness of each merging form can be obtained according to the fluctuation degree of evacuation time under the different pedestrian flow. …”
Get full text
Article -
15339
Krylov complexity in 2d CFTs with SL(2, ℝ) deformed Hamiltonians
Published 2025-02-01“…Furthermore, we extend our analysis to compute the K-Complexity of a light operator in excited states, considering both large-c CFT and free field theory. …”
Get full text
Article -
15340
Interactive trajectory prediction for autonomous driving based on Transformer
Published 2025-02-01“…This finessing not only captures the profound interdependence between agents and their surroundings but also imbues the algorithm with a better real-time predictive prowess, enhancing computational efficiency. Eventually, substantial experiments with the Argoverse dataset will demonstrate improved trajectory accuracy, with the minimum average displacement error (MADE) and minimum final displacement error (MFDE) being reduced by 12 % and 31 %, respectively.…”
Get full text
Article