Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
26501
Next decade of telecommunications artificial intelligence
Published 2021-03-01“…It has been an exciting journey since the mobile communications and AI were conceived 37 years and 64 years ago.While both fields evolved independently and profoundly changed communications and computing industries, the rapid convergence of 5G and AI is beginning to significantly transform the core communication infrastructure, network management and vertical applications.The individual roadmaps of mobile communications and artificial intelligence in the early stage were firstly outlined, with a concentration to review the era from 3G to 5G when AI and mobile communications started to converge.With regard to telecommunications artificial intelligence, the progress of AI in the ecosystem of mobile communications was further introduced in detail, including network infrastructure, network operation and management, business operation and management, intelligent applications towards BSS & OSS convergence, verticals and private networks etc.Then the classifications of AI in telecom ecosystems were summarized along with its evolution paths specified by various international telecommunications standardization bodies.Towards the next decade, the prospective roadmap of telecommunications artificial intelligence was forecasted.In line with 3GPP and ITU-R’s timeline of 5G & 6G, the network intelligence following 3GPP and O-RAN routes, experience and intention driven network management and operation, network AI signaling system, intelligent middle-office based BSS, intelligent customer experience management and policy control driven by BSS& OSS convergence, evolution from SLA to ELA, and intelligent private network for verticals were further explored.It concludes that with the vision AI will reshape the future B5G/6G landscape, and we need fully take the unprecedented opportunities.…”
Get full text
Article -
26502
Nature–Inspired Metaheuristic Optimization for Control Tuning of Complex Systems
Published 2024-12-01“…The performance of the ALO and WOA techniques for the tuning of conventional PID controllers is evaluated in relation to the number of agents <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>n</mi><mi>S</mi></msub></semantics></math></inline-formula> and the maximum number of iterations <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>n</mi><mrow><mi>M</mi><mi>a</mi><mi>x</mi><mi>I</mi><mi>t</mi><mi>e</mi><mi>r</mi></mrow></msub></semantics></math></inline-formula>; given the stochastic nature of both methods, repeatability is also addressed. Finally, the computational effort required for their implementation is considered. …”
Get full text
Article -
26503
Transforaminal lumbar interbody fusion (TLIF) surgery: A finite element analysis of open and minimally invasive approach on L4-L5 segment
Published 2025-01-01“…Background: To compare the effect of minimally invasive and open transforaminal lumbar interbody fusion (TLIF) approaches in fusing the L4-L5 segment and predicting the potential risk of adjacent segment degeneration (ASD). Methods: A computed tomography scan image was processed and the three-dimensional model of the L1-L5 spine was reconstructed. …”
Get full text
Article -
26504
Large-scale S-box design and analysis of SPS structure
Published 2023-02-01“…A class of optimal linear transformation P over a finite field<inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow> <msup> <mrow> <mrow><mo>(</mo> <mrow> <msubsup> <mi>F</mi> <mn>2</mn> <mi>m</mi> </msubsup> </mrow> <mo>)</mo></mrow></mrow> <mn>4</mn> </msup> </mrow></math></inline-formula> was constructed based on cyclic shift and XOR operation.Using the idea of inverse proof of input-output relation of linear transformation for reference, a proof method was put forward that transformed the objective problem of optimal linear transformation into several theorems of progressive relation, which not only solved the proof of that kind of optimal linear transformation, but also was suitable for the proof of any linear transformation.By means of small-scale S-box and optimal cyclic shift-XOR linear transformation P, a large-scale S-box model with 2-round SPS structure was established, and a series of lightweight large-scale S-boxes with good cryptographic properties were designed.Only three kind of basic operations such as look-up table, cyclic shift and XOR were used in the proposed design scheme, which improved the linearity and difference uniformity of large-scale S-boxes.Theoretical proof and case analysis show that, compared with the existing large-scale S-box construction methods, the proposed large-scale S-box design scheme has lower computational cost and better cryptographic properties such as difference and linearity, which is suitable for the design of nonlinear permutation coding of lightweight cryptographic algorithms.…”
Get full text
Article -
26505
Addressing Data Imbalance in Crash Data: Evaluating Generative Adversarial Network’s Efficacy Against Conventional Methods
Published 2025-01-01“…Given the significantly lower computational resources required by cost-sensitive learning, this approach is recommended for handling imbalanced injury severity data.…”
Get full text
Article -
26506
Crisis Spreading Model of the Shareholding Networks of Listed Companies and Their Main Holders and Their Controllability
Published 2018-01-01“…Then, the numerical computation method is successfully used to analyze the crisis spreading in the networks when the networks meet random failures or intentional attacks. …”
Get full text
Article -
26507
Challenges in Diagnosis and Management of Altered Mental Status in the Setting of Urosepsis and Hydrocephalus Secondary to an Occlusive Cyst of the Fourth Ventricle: A Case Report
Published 2025-01-01“…Brain imaging, including magnetic resonance imaging (MRI) and computed tomography (CT), facilitated the diagnosis, suggesting hydrocephalus with downward tonsillar herniation. …”
Get full text
Article -
26508
Facies-Constrained Kriging Interpolation Method for Parameter Modeling
Published 2024-12-01“…Furthermore, the FC-Kriging method does not introduce additional computational complexity, making it convenient to implement in a 3D situation. …”
Get full text
Article -
26509
Research on the Revolution of Multidimensional Learning Space in the Big Data Environment
Published 2021-01-01“…However, the cluster computing system for hybrid big data applications has the characteristics of heterogeneous requirements, which makes more and more cluster resource managers support fine-grained multidimensional learning resource management. …”
Get full text
Article -
26510
A multimodal multistream multilevel fusion network for finger joint angle estimation with hybrid sEMG and FMG sensing
Published 2025-01-01“…The experimental results suggest that the MMMFNet has higher estimation accuracy (RMSE: 6.225±0.276 vs. 6.953±0.282, R2: 0.879±0.019 vs 0.846±0.021), shorter training time (4.146±0.074 min vs. 16.536±0.430 min), and lower computational complexity (5.4×106 FLOPs vs 8.8×106 FLOPs) than state-of-the-art fusion methods. …”
Get full text
Article -
26511
3D Fusion Framework for Infarction and Angiogenesis Analysis in a Myocardial Infarct Minipig Model
Published 2017-05-01“…In this study, a 3D fusion framework is designed to integrate coronary computed tomography (CT) angiography (CTA), 2-deoxy-2-[ 18 F]fluoro-D-glucose ([ 18 F]DG) positron emission tomography (PET)/CT, and [ 68 Ga]-1,4,7-triazacyclononane-1,4,7-triacetic acid-(Arg-Gly-Asp)2 ([ 68 Ga]-NOTA-PRGD2) PET/CT images of the myocardial infarction model in minipigs. …”
Get full text
Article -
26512
Multiple Levels of Letter Representation in Written Spelling: Evidence From a Single Case of Dysgraphia with Multiple Deficits
Published 2005-01-01“…We argue that these contrasting patterns of letter error distribution result from damage to two distinct levels of letter representation and processing within the spelling system, namely, the amodal graphemic representation held in the graphemic buffer and the letter form representation computed by subsequent writing-specific processes. …”
Get full text
Article -
26513
Numerical Simulation of Turbulent Fluid Flow and Heat Transfer in a Ribbed Rotating Two-Pass Square Duct
Published 2005-01-01“…<p>The local turbulent fluid flow and heat transfer in a rotating two-pass square duct with 19 pairs of in-line <math alttext="$90^{circ}$"><msup><mn>90</mn> <mo>∘</mo> </msup> </math> ribs have been investigated computationally. A Reynolds-averaged Navier-Stokes equation (RANS) with a two-layer <math alttext="${k}-varepsilon$"><mi>k</mi> <mo>−</mo> <mi>ϵ</mi> </math> turbulence model was solved. …”
Get full text
Article -
26514
A rare case of temporal arteritis in a young Indian male
Published 2023-01-01“…Surrounding areas showed minimal inflammatory changes which were further reconfirmed by computed tomography. Left temporal artery biopsy showed thickening of the tunica media and adventitia with the fragmentation of the internal elastic membrane. …”
Get full text
Article -
26515
Rapid estimation method of lithium battery state of health based on novel health feature
Published 2025-01-01“…Most data-driven lithium battery SOH estimation methods are computationally intensive and difficult to use in real-time in battery management system microcontrollers. …”
Get full text
Article -
26516
Association of systemic immune-inflammation index with all-cause and cardiovascular mortality among adults with depression: evidence from NHANES 2005–2018
Published 2025-01-01“…Cox proportional hazards regression models to compute hazard ratios (HR) and 95% confidence intervals (CI) for mortality.The restricted cubic spline(RCS), Kaplan-Meier curve analysis, time-dependent ROC analysis, subgroup and sensitivity analyses were also used. …”
Get full text
Article -
26517
Proven secure blind adaptor signature scheme based on the SM2
Published 2024-04-01“…Performance analysis indicates that the computational overhead of the SM2 blind adaptor signature scheme is minimal, with the total operation time of the signature process only increasing by a negligible 5.91ms compared to the SM2 adaptor signature scheme. …”
Get full text
Article -
26518
Implications for cost and access of site-of-service referrals for ancillary medical services in a US Medicaid population: analysis of claims data from Maryland, USA
Published 2022-06-01“…We also quantified the implications of this shift on access to services, with a focus on differences in access between rural and urban patients for a Medicaid (disadvantaged) population in Maryland, USA.Design Using a dataset of all Medicaid claims records for 1 year, we identified and extracted all bundles of regulated and unregulated ancillary services. Geospatial computing was used to approximate transportation costs required to access services. …”
Get full text
Article -
26519
Varicella Zoster Virus-induced Acute Retinal Necrosis Following Acute Meningoencephalitis in a Patient with Presumed COVID-19
Published 2024-12-01“…Magnetic resonance imaging (MRI), cerebrospinal fluid (CSF) analysis, polymerase chain reaction (PCR) of the aqueous humor, reverse transcription polymerase chain reaction (RTPCR) of the nasopharyngeal swab specimen, chest computed tomography (CT), and fundus photography were performed for the patient. …”
Get full text
Article -
26520
Data-Driven Technologies for Energy Optimization in Smart Buildings: A Scoping Review
Published 2025-01-01“…The key technologies identified included big data analytics, Artificial Intelligence, Machine Learning, the Internet of Things, Wireless Sensor Networks, Edge and Cloud Computing, Blockchain, Digital Twins, and Geographic Information Systems. …”
Get full text
Article