Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
5381
Recursive determination of the enumerator for sums of three squares
Published 2000-01-01“…Here presented is a two-step recursive scheme for computing r3(n), n≥0.…”
Get full text
Article -
5382
PROBABILITY MATHEMATICAL MODEL OF CRYSTALLIZATION OF BINARY ALLOY AT POURING OF STEEL
Published 2008-05-01“…The critical analysis of some modifications of quasiequilibrium model, which gained ground in computing practice at calculations of ingots consolidation, is carried out. …”
Get full text
Article -
5383
-
5384
A Novel Influence Maximization Algorithm for a Competitive Environment Based on Social Media Data Analytics
Published 2022-06-01Get full text
Article -
5385
-
5386
Effective Variational Data Assimilation in Air-Pollution Prediction
Published 2018-12-01“…The Empirical Orthogonal Functions (EOFs) method is used to alleviate the computational cost and reduce the space dimension. Experimental results are provided assuming observed values provided by sensors from positions mainly located on roofs of buildings.…”
Get full text
Article -
5387
Refactoring Android Source Code Smells From Android Applications
Published 2025-01-01Get full text
Article -
5388
An efficient cryptographic technique using modified Diffie–Hellman in wireless sensor networks
Published 2020-06-01“…This article introduces a data security approach with less computational and response times based on a modified version of Diffie–Hellman. …”
Get full text
Article -
5389
SVD-GoRank: Recommender System Algorithm Using SVD and Gower’s Ranking
Published 2025-01-01Get full text
Article -
5390
A Fast Optimization Method for Reliability and Performance of Cloud Services Composition Application
Published 2013-01-01“…At present the cloud computing is one of the newest trends of distributed computation, which is propelling another important revolution of software industry. …”
Get full text
Article -
5391
An Adaptive Scalable Data Pipeline for Multiclass Attack Classification in Large-Scale IoT Networks
Published 2024-06-01Get full text
Article -
5392
Effects of Exercise in Immersive Virtual Environments on Cortical Neural Oscillations and Mental State
Published 2015-01-01Get full text
Article -
5393
Sparse Deep Nonnegative Matrix Factorization
Published 2020-03-01“…We adopted the Nesterov's accelerated gradient algorithm to accelerate the computing process. We also analyzed the computing complexity of our frameworks to demonstrate their efficiency. …”
Get full text
Article -
5394
Online Structural Health Monitoring and Parameter Estimation for Vibrating Active Cantilever Beams Using Low-Priced Microcontrollers
Published 2015-01-01“…The presence of undesirable structural change is detected by variations of the first resonance estimate computed from the observed equivalent mass, stiffness, damping, and voltage-force conversion coefficients. …”
Get full text
Article -
5395
MXene-based multilayered and ultrawideband absorber for solar cell and photovoltaic applications
Published 2025-01-01Get full text
Article -
5396
Thermal-Aware Multiconstrained Intrabody QoS Routing for Wireless Body Area Networks
Published 2014-03-01Get full text
Article -
5397
Anomaly detection solutions: The dynamic loss approach in VAE for manufacturing and IoT environment
Published 2025-03-01“…The proposed model addresses key challenges, including data imbalance, interpretability issues, and computational complexity. By leveraging the bidirectional capability of BiLSTM in the encoder and decoder, the model captures comprehensive temporal dependencies, enabling more effective anomaly detection. …”
Get full text
Article -
5398
Ecological momentary interventions for mental health: A scoping review.
Published 2021-01-01“…<h4>Background</h4>The development of mobile computing technology has enabled the delivery of psychological interventions while people go about their everyday lives. …”
Get full text
Article -
5399
Entangling Schrödinger’s cat states by bridging discrete- and continuous-variable encoding
Published 2025-02-01Get full text
Article -
5400
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
Published 2025-01-01“…Moreover, comparative performance shows that it incurs the lowest energy and computation costs at relatively low communication overheads.…”
Get full text
Article