Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
24121
Quantum and Classical Dynamics with Random Permutation Circuits
Published 2025-01-01“…We show that, upon averaging over all circuit realizations, RPCs permit the analytical computation of several key quantities such as out-of-time-order correlators (OTOCs) and entanglement entropies. …”
Get full text
Article -
24122
A thermodynamic description of metastable c-TiAlZrN coatings with triple spinodally decomposed domains
Published 2017-01-01“…., c-TiN, c-AlN, and c-ZrN, was performed via the CALculation of PHAse Diagram (CALPHAD) technique based on the limited experimental data as well as the first-principles computed free energies. The metastable c-TiAlZrN coatings were modeled as a pseudo-ternary phase consisting of c-TiN, c-AlN and c-ZrN species, and described using the substitutional solution model. …”
Get full text
Article -
24123
Les novellisations de Bordage : expérimentations transmédiatiques du multimédia dans la science-fiction française
Published 2019-06-01“…Les fils du rayon d’or, 1998), the other adapted from a computer-generated 3D movie (Kaena, la prophétie, 2003). …”
Get full text
Article -
24124
What was Killing Babies in Ipswich Between 1872 and 1909?
Published 2022-07-01“…Ipswich is the only town in England for which a complete run of computer-readable, individual-level causes of death are available in the late 19th and early 20th century. …”
Get full text
Article -
24125
Event-Based Visual/Inertial Odometry for UAV Indoor Navigation
Published 2024-12-01“…In this study, an event-based visual–inertial odometry approach is proposed, emphasizing adaptive event accumulation and selective keyframe updates to reduce computational overhead. The proposed approach fuses events, standard frames, and inertial measurements for precise indoor navigation. …”
Get full text
Article -
24126
Small target detection in UAV view based on improved YOLOv8 algorithm
Published 2025-01-01“…This change maintains the model’s performance while significantly reducing the computational load. Lastly, the detection head adds a channel attention mechanism. …”
Get full text
Article -
24127
Penatalaksanaan Kista Teratoid Leher
Published 2020-08-01“…Dilaporkan kasus seorang laki-laki usia 49 tahun dengan benjolan di leher yang membesar secara perlahan sejak 1 bulan dan hasil Computed Tomography (CT) Scan tiroid dan leher dicurigai sebagai kista tiroglosus dan didiagnosis banding dengan kista dermoid. …”
Get full text
Article -
24128
3D Face Modeling Algorithm for Film and Television Animation Based on Lightweight Convolutional Neural Network
Published 2021-01-01“…The algorithm uses the difference criterion instead of the entropy criterion to avoid the “small sample” problem, and the use of QR decomposition can extract more effective discriminative features for facial recognition, while also reducing the computational complexity of feature extraction. Compared with traditional feature extraction methods, GMMSD avoids the problem of “small samples” and does not require preprocessing steps on the samples; it uses QR decomposition to extract features from the original samples and retains the distribution characteristics of the original samples. …”
Get full text
Article -
24129
Toward Questionnaire Complexity Reduction by Decreasing the Questions
Published 2025-01-01“…To evaluate the effectiveness of the proposed method, it has been used across various subjects in Computer Sciences Engineering degrees over different academic years. …”
Get full text
Article -
24130
PRIORITISATION OF ON-CAMPUS UNIVERSITY STUDENT HOUSING FACILITY SPACES
Published 2019-09-01“…The study found that bathrooms, sleeping spaces, kitchens, study areas, libraries, sick bays, computer labs, bookshops, dry line areas and discussion rooms are ‘extremely important’ spaces that students expect in an ideal SHF. …”
Get full text
Article -
24131
The effect of 6-weeks competition period training on body composition of boxers
Published 2017-08-01“…Mean and standard deviation were computed. According to tests of normality, the Independent t-test was used to compare paired groups. …”
Get full text
Article -
24132
ISLRWR: A network diffusion algorithm for drug-target interactions prediction.
Published 2025-01-01“…Machine learning techniques and computer-aided methods are now widely used in the pre-discovery tasks of drug discovery, effectively improving the efficiency of drug development and reducing the workload and cost. …”
Get full text
Article -
24133
Anonymous trust management scheme of VANET based on attribute signature
Published 2023-04-01“…Trust management mechanisms can solve the authenticity assessment problem of messages and establish trust between communication entities in the VANET.However, current trust management schemes lack an effective privacy protection mechanism, leading to privacy concerns for vehicles when binding their identity with their trust level.Based on the anonymity of attribute-based signature, an anonymous trust management scheme was proposed for VANET.The trust level of the vehicle was maintained by the trusted authority.The trust level of vehicles and the current time were taken as the attribute identity set of the vehicle, so as to realize the binding of the anonymous vehicle identity with its trust level, which could provide the privacy protection of vehicles.In addition, the timely update of attribute signature private key could resist false reputation attack and the trust level of the vehicle could be verified anonymously while the attribute signature was verified.Furthermore, the pseudonym was used to hide the real identity of the vehicle, enabling only the trusted authority could parse the real identity of vehicles from the pseudonym to update their trust level, and providing legal and secure tracking of the malicious vehicle identity vehicle.Under the general group model, the attribute-based signature scheme is proven to satisfy the security of unforgerability.The security analysis further shows that the scheme protects the identity and location privacy of vehicles, enables only the trusted authority to legally track malicious vehicles, resists false reputation attacks, ensures communication integrity, and resists replay attacks.Performance analysis confirms that the proposed scheme has better computation and communication efficiency than existing schemes.…”
Get full text
Article -
24134
Through-wall Human Pose Reconstruction and Action Recognition Using Four-dimensional Imaging Radar
Published 2025-02-01“…Additionally, to address the influence of walls on signal quality, this paper introduces a deep echo domain compensator that leverages the powerful fitting performance and parallel output characteristics of deep learning, thereby reducing the computational overhead of traditional wall compensation methods. …”
Get full text
Article -
24135
Endometriosis in Postmenopausal Woman Without Previous Hormonal Therapy: A Case Report
Published 2015-12-01“…The patient was then submitted to a computed tomography scan that showed multiple lobated cystic masses at both adnexa. …”
Get full text
Article -
24136
Gorham Stout syndrome in a pediatric patient. A case report
Published 2023-03-01“…The fever recurred and a marked increase in volume was observed in the dorsal lumbar region. Computed axial tomography and magnetic resonance imaging revealed osteolysis of the vertebral bodies from D8 to L2 and an increase in the adjacent soft tissues. …”
Get full text
Article -
24137
Correlation analysis between coiling tension and the sleeve's hoop stress
Published 2024-01-01“…This analytical solution not only holds promise for predicting the behavior of various thick-walled cylinders produced through different manufacturing processes involving coiling but also facilitates integration with monitoring systems to mitigate slumping during steel rolling operations, all while minimizing computational burden.…”
Get full text
Article -
24138
THE IMPACT OF THE PANDEMIC PERIOD ON THE MOTOR DEVELOPMENT OF 9TH AND 12TH GRADE STUDENTS
Published 2024-12-01“…Moreover, due to online lessons, the time children spent in front of computers increased considerably, leading to hypodynamia and negatively impacting the physical and mental health of children. …”
Get full text
Article -
24139
Neuropharmacological profile of new thiazepinone and thiazolidinone compounds designed by virtual screening
Published 2025-01-01“…Abstract To evaluate the neuropharmacological profile of new spiro thiazepinone and thiazolidinone compounds in CD1 mice after a computer-aided virtual screening based on a GABA-A/BZD site. …”
Get full text
Article -
24140
Brain tumor segmentation by deep learning transfer methods using MRI images
Published 2024-06-01“…Among such models, VGG16, VGG19, Mobilenetv2, Inception, Efficientnetb7, InceptionResnetV2, DenseNet201, DenseNet121 were used. The computational experimental analysis performed in the paper on a set of MRI brain images showed that the best encoder model for the above deep models was the DenseNet121 model with the following values of segmentation metrics Mean IoU of 91.34%, Mean Dice of 94.26%, Accuracy of 94.22%. …”
Get full text
Article