Showing 581 - 600 results of 21,428 for search '"computational"', query time: 0.06s Refine Results
  1. 581

    Dynamics of a Delayed Model for the Transmission of Malicious Objects in Computer Network by Zizhen Zhang, Huizhong Yang

    Published 2014-01-01
    “…An SEIQRS model for the transmission of malicious objects in computer network with two delays is investigated in this paper. …”
    Get full text
    Article
  2. 582

    The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures by Ajit Narayanan, Yi Chen, Shaoning Pang, Ban Tao

    Published 2013-01-01
    “…The continuous growth of malware presents a problem for internet computing due to increasingly sophisticated techniques for disguising malicious code through mutation and the time required to identify signatures for use by antiviral software systems (AVS). …”
    Get full text
    Article
  3. 583

    Enhancing Railway Maintenance Safety Using Open-Source Computer Vision by Donghee Shin, Jangwon Jin, Jooyoung Kim

    Published 2021-01-01
    “…Images of railway signs, tracks, and maintenance workers on the tracks were recorded through image data. The Computer Vision OpenCV library was utilized to extract the image data. …”
    Get full text
    Article
  4. 584

    Reattack of a Certificateless Aggregate Signature Scheme with Constant Pairing Computations by Hang Tu, Debiao He, Baojun Huang

    Published 2014-01-01
    “…A new attack against a novel certificateless aggregate signature scheme with constant pairing computations is presented. To enhance security, a new certificateless signature scheme is proposed first. …”
    Get full text
    Article
  5. 585

    Measurements and Analytical Computer-Based Study of CMOS Inverters and Schmitt Triggers by Umesh Kumar

    Published 1996-01-01
    “…Complete detailed theoretical, experimental and computer based results are derived and exhibited.…”
    Get full text
    Article
  6. 586

    On Computation and Analysis of Topological Index-Based Invariants for Complex Coronoid Systems by Muhammad Aamer Rashid, Sarfraz Ahmad, Muhammad Kamran Siddiqui, Mohammed K. A. Kaabar

    Published 2021-01-01
    “…Explicitly, this tremendous improvement has been outstanding in the field of soft computing, molecular biology, and information technology. …”
    Get full text
    Article
  7. 587
  8. 588
  9. 589
  10. 590

    Combinatorial and Multinomial Coefficients and its Computing Techniques for Machine Learning and Cybersecurity by Chinnaraji Annamalai

    Published 2022-09-01
    Subjects: “…algorithm, combinatorics, computation, multinomial coefficient…”
    Get full text
    Article
  11. 591

    Analysis of the Impact of Big Data on E-Commerce in Cloud Computing Environment by Rongrui Yu, Chunqiong Wu, Bingwen Yan, Baoqin Yu, Xiukao Zhou, Yanliang Yu, Na Chen

    Published 2021-01-01
    “…Finally, based on the impact of cloud computing, mobile e-commerce is analyzed, including relevant theories, service mode, architecture, core technology, and the application in e-commerce, which can realize e-commerce precision marketing, find the optimal path of logistics, and take effective security measures to avoid transaction risks. …”
    Get full text
    Article
  12. 592

    Computer-Aided Modelling and Analysis of PV Systems: A Comparative Study by Charalambos Koukouvaos, Dionisis Kandris, Maria Samarakou

    Published 2014-01-01
    “…The work presented in this paper aims on a first level at the performance analysis of various configurations of photovoltaic systems through computer-aided modelling. On a second level, it provides a comparative evaluation of the credibility of two of the most advanced graphical programming environments, namely, Simulink and LabVIEW, with regard to their application in photovoltaic systems.…”
    Get full text
    Article
  13. 593
  14. 594

    Similarity Learning and Generalization with Limited Data: A Reservoir Computing Approach by Sanjukta Krishnagopal, Yiannis Aloimonos, Michelle Girvan

    Published 2018-01-01
    “…We present two Reservoir Computing architectures, which loosely resemble neural dynamics, and show that a Reservoir Computer (RC) trained to identify relationships between image pairs drawn from a subset of training classes generalizes the learned relationships to substantially different classes unseen during training. …”
    Get full text
    Article
  15. 595

    Usability of Computer-Aided Translation Software Based on Deep Learning Algorithms by Junjun Liu

    Published 2022-01-01
    “…In recent years, due to the development of computer technology and information technology, web technology has changed the mode of translation at an alarming rate. …”
    Get full text
    Article
  16. 596

    Perancangan Aplikasi Computer based Test (CBT) Psikotes Berbasis Website by Sistha Putri Hemawati, Hanna Prillysca Chernovita

    Published 2022-10-01
    “…Maka, perlu dibangun aplikasi Computer Based Test (CBT) psikotes. Aplikasi ini dapat diikuti oleh peserta umum maupun pelajar. …”
    Get full text
    Article
  17. 597
  18. 598
  19. 599
  20. 600