Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
1081
Computational Approaches to Facilitate Epitope-Based HLA Matching in Solid Organ Transplantation
Published 2017-01-01“…Thus, our data suggest that our computational approach is a powerful tool to estimate PIRCHE-II/eplet values when high-resolution HLA genotype data is not available.…”
Get full text
Article -
1082
Unveiling the multifunctionality of iron oxide nanoparticle: A synergistic experimental and computational investigation
Published 2025-06-01Subjects: Get full text
Article -
1083
Point spread function estimation with computed wavefronts for deconvolution of hyperspectral imaging data
Published 2025-01-01“…To address this challenge, we have developed a method for PSF estimation in HSI systems based on computed wavefronts. The proposed technique optimizes an image quality metric by modifying the shape of a computed wavefront using Zernike polynomials and subsequently calculating the corresponding PSFs for input into a deconvolution algorithm. …”
Get full text
Article -
1084
Protective and Blast Resistive Design of Posttensioned Box Girders Using Computational Geometry
Published 2018-01-01“…The algorithm is based on a diagonal cross point in the Magnel quadrilateral and uses computational geometry instead of graphical drawing. …”
Get full text
Article -
1085
In-Network Filtering Schemes for Type-Threshold Function Computation in Wireless Sensor Networks
Published 2014-08-01“…In particular, we consider the computation of the maximum function as case study for these schemes. …”
Get full text
Article -
1086
Retracted: Computing First and Second Fuzzy Zagreb Indices of Linear and Multiacyclic Hydrocarbons
Published 2023-01-01Get full text
Article -
1087
Computational Fluid Dynamics Modelling of Microfluidic Channel for Dielectrophoretic BioMEMS Application
Published 2014-01-01Get full text
Article -
1088
Investigation of Flow Through Centrifugal Pump Impellers Using Computational Fluid Dynamics
Published 2003-01-01“…With the aid of computational fluid dynamics, the complex internal flows in water pump impellers can be well predicted, thus facilitating the design of pumps. …”
Get full text
Article -
1089
Computation and Analysis of High Rocky Slope Safety in a Water Conservancy Project
Published 2015-01-01Get full text
Article -
1090
An edge cloud–based body data sensing architecture for artificial intelligence computation
Published 2019-04-01“…As various applications and workloads move to the cloud computing system, traditional approaches of processing sensor data cannot be applied. …”
Get full text
Article -
1091
Localized and Excimer Triplet Electronic States of Naphthalene Dimers: A Computational Study
Published 2025-01-01“…Excimer minima exhibit a very intense absorption spectrum, peaking above 500 nm. The computed absorption spectra of localized minima significantly depend on the stacking geometry and do not coincide with that of isolated naphthalene. …”
Get full text
Article -
1092
Scheme on user identity attribute preserving based on ring signcryption for cloud computing
Published 2014-09-01“…Identity attribute leak as the most severe security threat of cloud computing,in order to solve this problem,a protection scheme of identity attributes based on ring signcryption was proposed.Focused on digital identity management in cloud service,which discusses user key parting management with decentralization.Users can choose some seeds for generation and storage of key,then integrated user key cannot be acquired by registrar,based on this payload on certifica-tion management is reduced.In addition,access-centric blindness ring signcryption verification for identity attribute is designed,which constitutes ring of users and CSP,combined with own attribute users can accomplish ring-oriented sub-linear blindness signcryption and non-interactive public ciphertext verifiability for messages so that integrity and confidentiality of identity attribute can be protected avoiding identity attribute leakage in collusion of multi-CSP.At last,strong blindness and unforgeability of ciphertext and attribute is proved in proposed model,three private key components can be generated by users and identity forgeability of ring member can be prevented successfully on the condition of DBDH difficult assumption and adaptive chosen-ciphertex tattacking.Effectiveness of proposed mechanism is verified via performance evaluation of blindness ring signcryption algorithm based on comprehensive payload in identity attribute protection,and optimization is confirmed compared with similar algorithms.…”
Get full text
Article -
1093
Trusted coalition-proof protocol model based on secure multi-part computing
Published 2011-01-01Subjects: Get full text
Article -
1094
Current Practice in the Management of Pulmonary Nodules Detected on Computed Tomography Chest Scans
Published 2019-01-01“…It can present as one or more pulmonary nodules identified on computed tomography (CT) chest scans. The National Lung Screening Trial has shown that the use of low-dose CT chest screening can reduce deaths due to lung cancer. …”
Get full text
Article -
1095
Optimizing strategy of computing off loading energy consumption based on Lagrangian method
Published 2018-12-01Subjects: “…edge computing…”
Get full text
Article -
1096
Retracted: The Integrated Processing Method of Educational Information Resources Based on Edge Computing
Published 2024-01-01“…Journal of Electrical and Computer Engineering…”
Get full text
Article -
1097
Joint Optimization of Energy Conservation and Migration Cost for Complex Systems in Edge Computing
Published 2019-01-01“…Therefore, it remains an issue to achieve dynamic scheduling of the computing resources across edge servers. With the consideration of this issue, a Balanced Resource Scheduling Method, named BRSM, for trade-offs between virtual machine (VM) migration cost and energy consumption of VM migrations for edge server management, named BRSM, is designed in this paper. …”
Get full text
Article -
1098
Role of Multislice Computed Tomography and Local Contrast in the Diagnosis and Characterization of Choanal Atresia
Published 2011-01-01“…To illustrate the role of multislice computed tomography and local contrast instillation in the diagnosis and characterization of choanal atresia. …”
Get full text
Article -
1099
Abstract Computation in Schizophrenia Detection through Artificial Neural Network Based Systems
Published 2015-01-01“…Therefore, this work will focus on the development of a diagnostic support system, in terms of its knowledge representation and reasoning procedures, based on a blended of Logic Programming and Artificial Neural Networks approaches to computing, taking advantage of a novel approach to knowledge representation and reasoning, which aims to solve the problems associated in the handling (i.e., to stand for and reason) of defective information.…”
Get full text
Article -
1100
Retracted: Predicting Carbon Residual in Biomass Wastes Using Soft Computing Techniques
Published 2023-01-01Get full text
Article