Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
5121
Lie Symmetry Analysis of a First-Order Feedback Model of Option Pricing
Published 2015-01-01“…This model arises as an extension of the classical Black-Scholes model when liquidity is incorporated into the market. We compute the admitted Lie point symmetries of the system and construct an optimal system of the associated one-dimensional subalgebras. …”
Get full text
Article -
5122
Implementation of Steiner Point of Fuzzy Set
Published 2014-01-01“…This paper focuses on establishing efficient methods to compute Steiner point of fuzzy set. Two strategies of computing Steiner point of fuzzy set are proposed. …”
Get full text
Article -
5123
Spectrum of Superhypergraphs via Flows
Published 2022-01-01“…The flow of superedges plays the main role in computing of spectrum of superhypergraphs, so we compute the spectrum of superhypergraphs in some types such as regular flow, regular reversed flow, and regular two-sided flow. …”
Get full text
Article -
5124
An Integer Linear Programming Model for Partially Ordered Sets
Published 2022-01-01“…Finally, ILPM is run on fifteen benchmark partially ordered sets for finding their width. The computational experiments show the validity of the proposed model.…”
Get full text
Article -
5125
Analysis of Layered Composite Beam to Underwater Shock Including Structural Damping and Stiffness Effects
Published 2002-01-01“…The effective structural damping and stiffness are formulated and incorporated in the fluid-structure-coupled equations, which relate the structure response to fluid impulsive loading and are solved using coupled finite-element and DAA-boundary element codes. The present computational method facilitates the study of transient response of the layered composite beams to underwater shock, involving the effects of structural damping and stiffness. …”
Get full text
Article -
5126
-
5127
H∞-Based Pinning Synchronization of General Complex Dynamical Networks with Coupling Delays
Published 2013-01-01Get full text
Article -
5128
Exact Probabilities and Confidence Limits for Binomial Samples: Applied to the Difference between Two Proportions
Published 2010-01-01“…An exact probabilities method is proposed for computing the confidence limits of medical binomial parameters obtained based on the 2×2 contingency table. …”
Get full text
Article -
5129
Stability of Stochastic Reaction-Diffusion Recurrent Neural Networks with Unbounded Distributed Delays
Published 2011-01-01Get full text
Article -
5130
Quantum-based wireless sensor networks: A review and open questions
Published 2021-10-01“…Applications of quantum computing are growing at a very fast pace, for example, from quantum computers to quantum algorithms and even to the development of the quantum Internet. …”
Get full text
Article -
5131
-
5132
Similarity Property and Slide Attack of Block Cipher FESH
Published 2023-01-01Get full text
Article -
5133
-
5134
-
5135
A Numerical and Analytical Study of a Stochastic Epidemic SIR Model in the Light of White Noise
Published 2022-01-01Get full text
Article -
5136
-
5137
Assessment model of ozone pollution based on SHAP-IPSO-CNN and its application
Published 2025-01-01Get full text
Article -
5138
-
5139
XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System
Published 2025-01-01“…The rapid evolution of technologies such as the Internet of Things (IoT), 5G, and cloud computing has exponentially increased the complexity of cyber attacks. …”
Get full text
Article -
5140
Implementation and Performance of Lightweight Authentication Encryption ASCON on IoT Devices
Published 2025-01-01“…Results demonstrate that ASCON enables efficient and secure communications while minimizing computational overhead, making it a viable solution for IoT environments with constrained resources. …”
Get full text
Article