Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
5201
Data Analysis Method of Intelligent Analysis Platform for Big Data of Film and Television
Published 2021-01-01“…Based on cloud computing and statistics theory, this paper proposes a reasonable analysis method for big data of film and television. …”
Get full text
Article -
5202
-
5203
Limit Cycles and Local Bifurcation of Critical Periods in a Class of Switching Z2 Equivariant Quartic System
Published 2024-01-01“…First, through the computation of Lyapunov constants, the conditions of the two singularities to become the centers are determined. …”
Get full text
Article -
5204
Towards Sophisticated Air Traffic Control System Using Formal Methods
Published 2018-01-01Get full text
Article -
5205
DHRCA: A Design of Security Architecture Based on Dynamic Heterogeneous Redundant for System on Wafer
Published 2024-01-01“…In this paper, we propose a computing architecture based on endogenous security theory—dynamic heterogeneous redundant computing architecture (DHRCA) that can tolerate and detect HTs at runtime. …”
Get full text
Article -
5206
-
5207
Symmetry Breaking as a Basis for Characterization of Dielectric Materials
Published 2025-01-01Get full text
Article -
5208
Sumudu residual power series method to solve time-fractional Fisher’s equation
Published 2025-01-01“…In this paper, the one-dimensional nonlinear temporal fractional-order Fisher’s equation is solved by using the Sumudu residual power series method (SRPSM), a powerful computing technique. This method combines the RPSM and Sumudu transform to provide approximations of solutions using the notion of limit, in contrast to the standard residual power series method, which necessitates computing fractional derivatives. …”
Get full text
Article -
5209
A hybrid singular value thresholding algorithm with diagonal-modify for low-rank matrix recovery
Published 2024-11-01“…In this paper, a new hybrid singular value thresholding with diagonal-modify algorithm based on the augmented Lagrange multiplier (ALM) method was proposed for low-rank matrix recovery, in which only part singular values were treated by a hybrid threshold operator with diagonal-update, and which allowed the algorithm to make use of simple arithmetic operation and keep the computational cost of each iteration low. The new algorithm decreased the complexity of the singular value decomposition and shortened the computing time. …”
Get full text
Article -
5210
Identification of discrete chaotic maps with singular points
Published 2001-01-01Get full text
Article -
5211
-
5212
Maximization of Gain in Slow-Light Silicon Raman Amplifiers
Published 2011-01-01Get full text
Article -
5213
LSKE: Lightweight Secure Key Exchange Scheme in Fog Federation
Published 2021-01-01“…The fog computing architecture allows data exchange with the vehicle network, sensor networks, etc. …”
Get full text
Article -
5214
A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis
Published 2024-01-01Get full text
Article -
5215
Grad Ready: Enhancing graduate readiness through intelligent mobile application
Published 2024-12-01“…It is an intelligent mobile app that bridges the gap between academic knowledge and the professional skill requirements for computer science graduates using matching algorithms to enable companies to target and recruit them. …”
Get full text
Article -
5216
Applications of Matrices to a Matroidal Structure of Rough Sets
Published 2013-01-01Get full text
Article -
5217
Video Data Integrity Verification Method Based on Full Homomorphic Encryption in Cloud System
Published 2018-01-01“…Cloud computing is a new way of data storage, where users tend to upload video data to cloud servers without redundantly local copies. …”
Get full text
Article -
5218
Road Perception Based Geographical Routing Protocol for Vehicular Ad Hoc Networks
Published 2016-02-01Get full text
Article -
5219
Innovative IaaS Management System for Sensor Devices and IT Resources
Published 2014-06-01“…The evaluation results of SC show that the transmission delay for sensor data between the sensor devices and the users in SC was decreased by up to 81% compared to a typical cloud computing implementation.…”
Get full text
Article -
5220
Self-Adaptive Firefly-Algorithm-Based Unified Power Flow Controller Placement with Single Objectives
Published 2021-01-01Get full text
Article