Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
24921
FANT: Flexible Attention-Shifting Network Telemetry
Published 2025-01-01“…For scenarios requiring rapid computation, FANT can accelerate algorithm execution <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mn>10</mn><mn>5</mn></msup></semantics></math></inline-formula>× by setting acceleration factors, with only a 6.4% performance loss.…”
Get full text
Article -
24922
Study of the models of large-scale atmospheric circulation system model on intesify rainfall in Ardebil plain
Published 2022-09-01“…The frequency of circulation types over different periods is computed and described. Five circulation types are most recognised in this study: E, SE, A, C and CSE. …”
Get full text
Article -
24923
Automatic Control System Design for Industrial Robots Based on Simulated Annealing and PID Algorithms
Published 2022-01-01“…Therefore, it is necessary to focus on the value of computer technology, automation control technology, and sensor technology in the field of automation. …”
Get full text
Article -
24924
Optimization problems in liquefied natural gas transport and storage for multimodal transport companies
Published 2024-08-01“…To assess the efficiency of the linear model, we conduct computational experiments on small-scale instances with five inland cities, medium-scale instances with 15 inland cities, and large-scale instances with 60 inland cities. …”
Get full text
Article -
24925
An Inverted Residual Cross Head Knowledge Distillation Network for Remote Sensing Scene Image Classification
Published 2025-01-01“…The experimental results indicate that the proposed IRCHKD outperforms than some state-of-the-art RSSC approaches with a large margin in lower computational complexity.…”
Get full text
Article -
24926
Whole-Body Biodistribution, Dosimetry, and Metabolite Correction of [C]Palmitate: A PET Tracer for Imaging of Fatty Acid Metabolism
Published 2017-10-01“…Introduction: Despite the decades long use of [ 11 C]palmitate positron emission tomography (PET)/computed tomography in basic metabolism studies, only personal communications regarding dosimetry and biodistribution data have been published. …”
Get full text
Article -
24927
Association Between Maternal Physical Activity From Pre-pregnancy to Child-rearing and Their Children’s Physical Activity in Early Childhood Among Japanese
Published 2025-02-01“…Cumulative physical activity level in mothers was computed based on the categories (low, moderate, and high) of physical activity from five time points (pre-pregnancy, during pregnancy, 1.5, 3.5, and 5.5 years postpartum). …”
Get full text
Article -
24928
Establishment of Early Multi-Indicator Prediction Models of Moderately Severe Acute Pancreatitis and Severe Acute Pancreatitis
Published 2022-01-01“…The unwScore (AUC=0.854) and wScore (AUC=0.837) were superior to the acute physiology and chronic health evaluation II score (AUC=0.526), the bedside index for severity in AP score (AUC=0.766), and the Ranson score (AUC=0.693) in predicting MSAP and SAP, which were equivalent to the modified computed tomography severity index score (AUC=0.823). …”
Get full text
Article -
24929
18F-FDG-PET/CT can be used to predict distant metastasis in hypopharyngeal squamous cell carcinoma
Published 2022-04-01“…The role of the maximum standardized uptake value (SUVmax), which was assessed via pretreatment 18-fluorodeoxyglucose positron emission tomography (FDG-PET), and computed tomography (CT) was examined, for predicting distant metastasis and survival. …”
Get full text
Article -
24930
Fifteen-Year Follow-Up of a Patient with Acinar Cystic Transformation of the Pancreas and Literature Review
Published 2020-01-01“…A 10-year-old female initially presented with abdominal pain and was found to have a cystic lesion in the region of pancreatic head on computed tomography scan. She underwent an exploratory laparotomy, and the intraoperative biopsy of the cyst wall showed a true pancreatic cyst without malignancy. …”
Get full text
Article -
24931
A proposed methodology for the definition of background and reference values for trace elements in fluvial sediments
Published 2025-01-01“…We argue that background and reference values can be computed as the upper limits of the one-sided 95 % confidence interval for the median and for the 90th percentile, respectively. …”
Get full text
Article -
24932
Experiences of Emergency Surgical Treatment for a COVID-19 Patient with Severe Traumatic Brain Injury at a Regional Trauma Center: A Case Report
Published 2021-09-01“…Lacerations were observed in the left eyebrow area and preauricular area, with hemotympanum in the right ear. Brain computed tomography showed a contusional hemorrhage in the right frontal area and an epidural hematoma in the right temporal area with a compound, comminuted fracture and depressed skull bone. …”
Get full text
Article -
24933
Validating a UK Geomagnetically Induced Current Model Using Differential Magnetometer Measurements
Published 2024-02-01“…For the ground electric field computations we used recent magnetotelluric (MT) measurements recorded close to the DMM sites. …”
Get full text
Article -
24934
Improved urban runoff prediction using high-resolution land-use, imperviousness, and stormwater infrastructure data applied to a process-based ecohydrological model.
Published 2023-11-01“…., impervious surfaces, curbed roadways, stormwater routing) and refinement to the computational representations of evapotranspiration by adding impervious surface evaporation. …”
Get full text
Article -
24935
Exploring Ultrasound-Induced Changes on Bioactive Content and Color Properties of Sour Cherry Juice Involving Insights From Image Processing Analysis
Published 2025-01-01“…This study highlights the evaluation of the process-induced changes for better preservation of bioactive content and quality of fruit juices as well as establishes a baseline for evaluating the quality of nonthermally processed fruit juices through computer vision-based techniques.…”
Get full text
Article -
24936
Height Measurement Method for Meter-Wave Multiple Input Multiple Output Radar Based on Transmitted Signals and Receive Filter Design
Published 2025-01-01“…Compared to the GMUSIC and ML algorithms, it demonstrates superior performance in terms of computational complexity and multi-target elevation estimation.…”
Get full text
Article -
24937
Anthropomorphic service recovery: the panacea following service failure of automated CSAs
Published 2025-02-01“…Motivation for the study: Selected anthropomorphic traits of automated CSAs could make shoppers personify these agents as endowed with human qualities such as humour and response empathy, thereby enhancing the trustworthiness of non-human computer social actors. Research design, approach and method: A scenario-based quantitative survey was distributed as a hyperlink, yielding 287 valid participants. …”
Get full text
Article -
24938
Investigation of Heat and Mass Transfer in the Process of Fuel Preparation from Biomass Particles with High Moisture
Published 2023-08-01“…The fact that the proposed mathematical model and the results of the full-scale experiment are independent, while the calculated forecasts and experimental data are in good agreement, makes us possible to consider the proposed calculation method as a reliable scientific basis for a computer method for calculating of heat and mass transfer processes when organizing the preparation of fuel from carrot fruits.…”
Get full text
Article -
24939
Learning-based pattern-data-driven forecast approach for predicting future well responses
Published 2025-02-01“…Recently, data-driven forecast methods, such as data-space inversion (DSI) and a learning-based data-driven forecast approach (LDFA), have been introduced to mitigate the computational cost and geological constraint issues of history-matching methods. …”
Get full text
Article -
24940
Novel continuous identity authentication method based on mouse behavior
Published 2022-10-01“…With the rapid development of Internet technologies, security issues have always been the hot topics.Continuous identity authentication based on mouse behavior plays a crucial role in protecting computer systems, but there are still some problems to be solved.Aiming at the problems of low authentication accuracy and long authentication latency in mouse behavior authentication method, a new continuous identity authentication method based on mouse behavior was proposed.The method divided the user’s mouse event sequence into corresponding mouse behaviors according to different types, and mined mouse behavior characteristics from various aspects based on mouse behaviors.Thereby, the differences in mouse behavior of different users can be better represented, and the authentication accuracy can be improved.Besides, the importance of mouse behavior features was obtained by the ReliefF algorithm, and on this basis, the irrelevant or redundant features of mouse behavior were removed by combining the neighborhood rough set to reduce model complexity and modeling time.Moreover binary classification was adopted.The algorithm performed the training of the authentication model.During identity authentication, the authentication model was used to obtain a classification score based on the mouse behavior collected each time, and then the user’s trust value was updated in combination with the trust model.When the user’s trust value fell below the threshold of the trust model, it might be judged as illegal user.The authentication effect of the proposed method was simulated on the Balabit and DFL datasets.The results show that, compared with the methods in other literatures, this method not only improves the authentication accuracy and reduces the authentication latency, but also has a certain robustness to the illegal intrusion of external users.…”
Get full text
Article