Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
1201
Superconducting quantum computing optimization based on multi-objective deep reinforcement learning
Published 2025-01-01“…This method achieved excellent computational results on superconducting qubits. Optimum control of multi-process quantum computing can be achieved only by regulating the microwave pulse parameters of superconducting qubits, and such a set of global parameter values and control strategies are given.…”
Get full text
Article -
1202
Distributed representations enable robust multi-timescale symbolic computation in neuromorphic hardware
Published 2025-01-01Subjects: Get full text
Article -
1203
Anatomical Measurement of Normal Eustachian Tube on the Temporal Bone Computed Tomography Imaging
Published 2020-11-01“…Tujuan: Menggambarkan pengukuran anatomis tuba Eustachius normal pada pencitraan Computed Tomography (CT) tulang temporal. Metode: Ini adalah penelitian deskriptif tuba Eustachius normal dengan mengukur diameter pretimpani, sudut tubotimpani dan panjang pars kartilago tuba Eustachius normal menggunakan teknik rekonstruksi multiplanar pada pencitraan CT tulang temporal dari 58 sampel di beberapa rumah sakit di Makassar. …”
Get full text
Article -
1204
Apporach to the Method of Solving for Non-uniformity Factor in Computing the Aquatic Environmental Capacity
Published 2000-01-01Get full text
Article -
1205
Efficient optimisation of physical reservoir computers using only a delayed input
Published 2025-01-01“…Abstract Reservoir computing is a machine learning algorithm for processing time dependent data which is well suited for experimental implementation. …”
Get full text
Article -
1206
Investigation on Hydration and Deformation Characteristics of Shale Using X-ray Computed Tomography
Published 2022-01-01Get full text
Article -
1207
Personalized client-edge-cloud hierarchical federated learning in mobile edge computing
Published 2024-12-01Subjects: “…Mobile edge computing…”
Get full text
Article -
1208
Distinct neural computations scale the violation of expected reward and emotion in social transgressions
Published 2025-01-01“…These findings underscore that reward and emotional violations interact to shape decisions in complex social interactions, while the underlying neurofunctional PEs computations are distinguishable.…”
Get full text
Article -
1209
Research of the small Qubit quantum computing attack to the RSA public key cryptography
Published 2017-10-01“…The small Qubit quantum algorithm attack to RSA was proposed,the need Qubit of the first quantum register from 2L to L1,it can be reduced to 2 Qubit,the overall space complexity denoted (L1,L),where 2L1≥r,r is the period of decomposed.Because of the reduce of the first quantum register,it reduces the algorithm’s complexity and success rates,and use the binary look-up table method to compute the modular exponentiation,it enhances the computing speed.The improved algorithm’s quantum circuit complexity is T=O(2L2).It have a significant improvement on the time complexity and space complexity.Although the success rate is reduced,the overall success solution time is still lower than the Shor algorithm and the current major improvements Shor algorithm.Completed a simulation experiment.Respectively use the 11、10、9 Qubit decomposing the quantum circuit 119.The new algorithm explore the reality of using a universal quantum computer device to decipher the public key cryptography.…”
Get full text
Article -
1210
Predicting oxytocin binding dynamics in receptor genetic variants through computational modeling
Published 2025-02-01Get full text
Article -
1211
Bifid Mandibular Canal: A Proportional Meta-Analysis of Computed Tomography Studies
Published 2023-01-01“…In vivo, computed tomography, and cross-sectional studies were eligible. …”
Get full text
Article -
1212
Research on heterogeneous radio access and resource allocation algorithm in vehicular fog computing
Published 2019-06-01“…With the development of intelligent transportation and the constant emergence of new vehicular on-board applications,such as automatic driving,intelligent vehicular interaction and safety driving.It is difficult for an independent vehicle to run a wide variety of applications with a large number of computing needs and time delay needs relying on its own limited computing resources.By distributing computing tasks in devices on the edge of the network,fog computing applies virtualization technology,distributed computing technology and parallel computing technology to enable users to dynamically obtain computing power,storage space and other services on demand.Applying fog computing architecture to Internet of vehicles can effectively alleviate the contradiction between the large computing-low delay demands and limited vehicular resources.By analyzing the channel capacity of vehicle-to-vehicle communication,vehicle-infrastructure communication and vehicle-time-delay tolerant network communication,an optimization model of heterogeneous access to multi-service resources for the Internet of vehicles was established,and various vehicle-to-fog resources were jointly dispatched to realize efficient processing of intelligent transportation applications.The simulation results show that the proposed reinforcement learning algorithm can effectively deal with the resource allocation in the heterogeneous vehicular fog architecture.…”
Get full text
Article -
1213
Research on asynchronous robust federated learning method in vehicle computing power network
Published 2024-12-01Subjects: “…vehicle computing power network…”
Get full text
Article -
1214
Synthesis of Novel VO(II)-Perimidine Complexes: Spectral, Computational, and Antitumor Studies
Published 2018-01-01“…Essential parameters were computed based on frontier energy gaps with all compounds. …”
Get full text
Article -
1215
Three-Dimensional Measurement of TRISO Coated Particle Using Micro Computed Tomography
Published 2019-01-01“…The fuel safety and performance of high-temperature gas-cooled reactor (HTGR) are dependent on the integrity and geometric parameter of Tri-structural Isotropic (TRISO) coated particle. Micro X-ray computed tomography (CT) was used for nondestructive testing and three-dimensional measurement of the particle components which are composed of kernel, buffer layer, inner pyrolytic carbon layer (IPyC), silicon carbide (SiC) layer, and outer pyrolytic carbon (OPyC) layer. …”
Get full text
Article -
1216
Data outsourcing authentication model based on authenticated data structures for cloud computing
Published 2011-01-01Subjects: “…cloud computing…”
Get full text
Article -
1217
Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme
Published 2016-11-01Subjects: “…outsourcing cloud computing…”
Get full text
Article -
1218
Edge computing smart grid resource scheduling algorithm based on reinforcement learning
Published 2024-01-01Subjects: Get full text
Article -
1219
Computational Treatments of Cavitation Effects in Near-Free-Surface Underwater Shock Analysis
Published 2001-01-01“…Fluid cavitation constitutes an expensive computational nuisance in underwater-shock response calculations for structures at or just below the free surface. …”
Get full text
Article -
1220
Multi-authority attribute-based encryption with efficient user revocation in cloud computing
Published 2016-02-01Subjects: “…cloud computing…”
Get full text
Article