Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
1001
Hardware-efficient preparation of architecture-specific graph states on near-term quantum computers
Published 2025-01-01“…Abstract Highly entangled quantum states are an ingredient in numerous applications in quantum computing. However, preparing these highly entangled quantum states on currently available quantum computers at high fidelity is limited by ubiquitous errors. …”
Get full text
Article -
1002
Hardware Architecture for Real-Time Computation of Image Component Feature Descriptors on a FPGA
Published 2014-01-01“…This paper describes a hardware architecture for real-time image component labeling and the computation of image component feature descriptors. …”
Get full text
Article -
1003
Promoting Computational Access to Digital Collections in the Nordic and Baltic Countries: An Icelandic Use Case
Published 2025-01-01Subjects: Get full text
Article -
1004
Unilateral Fusion of Maxillary Lateral Incisor: Diagnosis Using Cone Beam Computed Tomography
Published 2014-01-01“…To report a case of right maxillary lateral incisor fusion and a supernumerary tooth, the anatomy of the root canal and dental united portion were assessed by cone beam computed tomography (CBCT). Results. The clinical examination showed dental juxtaposition with the absence of interdental papilla and esthetic impairment in the right maxillary lateral incisor region. …”
Get full text
Article -
1005
Computational Modelling Strategies for Nonlinear Response Prediction of Corroded Circular RC Bridge Piers
Published 2016-01-01Get full text
Article -
1006
Computationally Inexpensive Approach for Pitch Control of Offshore Wind Turbine on Barge Floating Platform
Published 2013-01-01“…In allusion to the external disturbances and uncertain system parameters of OFWT due to the proximity to load centers and strong wave coupling, this paper proposes a computationally inexpensive robust adaptive control approach with memory-based compensation for blade pitch control. …”
Get full text
Article -
1007
Computational Chemistry Study of pH-Responsive Fluorescent Probes and Development of Supporting Software
Published 2025-01-01“…This study employs quantum chemical computational methods to predict the spectroscopic properties of fluorescent probes 2,6-bis(2-benzimidazolyl)pyridine (BBP) and (<i>E</i>)-3-(2-(1<i>H</i>-benzo[<i>d</i>]imidazol-2-yl)vinyl)-9-(2-(2-methoxyethoxy)ethyl)-9<i>H</i>-carbazole (BIMC). …”
Get full text
Article -
1008
Computationally expensive constrained problems via surrogate-assisted dynamic population evolutionary optimization
Published 2025-01-01“…Abstract This paper proposes a surrogate-assisted dynamic population optimization algorithm (SDPOA) for the purpose of solving computationally expensive constrained optimization problems, in which the population is dynamically updated based on the real-time iteration information to achieve targeted searches for solutions with different qualities. …”
Get full text
Article -
1009
Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology
Published 2017-01-01“…Journal of Electrical and Computer Engineering…”
Get full text
Article -
1010
Agricultural Information Management Data Model Construction Based on Cloud Computing and Semantic Technology
Published 2022-01-01“…The registration rate improves than the traditional method by 12.46% and computational cost by 23.76%. This method has higher accuracy in storage data mining and retrieval for large information management systems and superior performance than the traditional method. …”
Get full text
Article -
1011
Retracted: A Microgrid Security Defense Method Based on Cooperation in an Edge-Computing Environment
Published 2023-01-01“…Journal of Electrical and Computer Engineering…”
Get full text
Article -
1012
Bilateral Obturator Hernia Diagnosed by Computed Tomography: A Case Report with Review of the Literature
Published 2014-01-01“…It is mistakenly diagnosed as femoral or inguinal hernia on USG. Computed tomography is diagnostic and is a valuable tool for preoperative diagnosis. …”
Get full text
Article -
1013
Silymarin as a Therapeutic Agent for Hepatocellular Carcinoma: A Multi-Approach Computational Study
Published 2025-01-01Get full text
Article -
1014
Parallel remote state preparation for fully device-independent verifiable blind quantum computation
Published 2025-01-01“…We introduce a device-independent two-prover scheme in which a classical verifier can use a simple untrusted quantum measurement device (the client device) to securely delegate a quantum computation to an untrusted quantum server. To do this, we construct a parallel self-testing protocol to perform device-independent remote state preparation of n qubits and compose this with the unconditionally secure universal verifiable blind quantum computation (VBQC) scheme of Fitzsimons and Kashefi [Phys. …”
Get full text
Article -
1015
Computational Insights in DNA Methylation: Catalytic and Mechanistic Elucidations for Forming 3-Methyl Cytosine
Published 2022-01-01“…To gain a deeper insight into the formation of 3 mC, we have performed density functional theory (DFT) modeling studies at different levels of theory to clearly map out the mechanistic details for this new methylation approach. Our computed results are in harmony with pertinent experimental observations and shed light on a crucial off-target activity of DNMTs.…”
Get full text
Article -
1016
Synthesis and evaluation of nitrochromene derivatives as potential antileishmanial therapeutics through biological and computational studies
Published 2025-01-01“…The dual approach of combining experimental and computational methods aims to provide a robust understanding of the compounds’ mechanisms of action and their potential as effective anti-leishmanial agents. …”
Get full text
Article -
1017
Computational Fluid Dynamics Analysis of Nasal Airway Changes after Treatment with C-Expander
Published 2021-01-01Get full text
Article -
1018
Adept Domestic Energy Load Profile Development Using Computational Intelligence-Based Modelling
Published 2024-01-01“…This research proposes a computational intelligence-based model for household electricity usage profile development as impacted by core input variables—household activities, household financial status, and occupancy presence. …”
Get full text
Article -
1019
Physical unclonable in-memory computing for simultaneous protecting private data and deep learning models
Published 2025-01-01“…Abstract Compute-in-memory based on resistive random-access memory has emerged as a promising technology for accelerating neural networks on edge devices. …”
Get full text
Article -
1020
Fuzzy logic based social trust computation scheme in Flying Ad-hoc network
Published 2025-03-01“…This paper describes a social trust computation scheme for clustered-based FANET, which utilises a reputable methodology to separate malicious UAVs within FANET. …”
Get full text
Article