Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
5661
Privacy in the Internet: Myth or reality
Published 2016-01-01“…The present time, unthinkable without using Internet - from e-mail, through social networks, cloud services, GPS, to YouTube and mobile computing in business, as well as on a private level, poses a question: Is there a way to protect data and their privacy on the Internet? …”
Get full text
Article -
5662
Solution theory of fractional SDEs in complete subcritical regimes
Published 2025-01-01Get full text
Article -
5663
Non-Abelian elastic collisions, associated difference systems of equations and discrete analytic functions
Published 2025-03-01Get full text
Article -
5664
Infinite Product Representation for the Szegö Kernel for an Annulus
Published 2022-01-01“…Numerical comparisons on computing the Szegö kernel for an annulus based on the Kerzman-Stein integral equation, the bilateral series, and the infinite product are also presented.…”
Get full text
Article -
5665
Performance analysis of dual-media cooperative communication based on wireless and power line under hybrid fading
Published 2019-05-01“…Given the deficiencies of lognormal variable add approximation method, lognormal distribution parameters combined computing method based on moment generation function was proposed. …”
Get full text
Article -
5666
Bosonic sectorized strings and the (DF)2 theory
Published 2020-01-01“…Abstract In this work, we investigate the bosonic chiral string in the sectorized inter- pretation, computing its spectrum, kinetic action and 3-point amplitudes. …”
Get full text
Article -
5667
Supply and Demand Matching of Financial Support Policies for Private Enterprises Based on Text Measurement
Published 2021-01-01“…In this paper, we use policy text computing method that integrates topic mining, text classification, and training set predictions to study the supply and demand matching of China’s financial support policies for private enterprises. …”
Get full text
Article -
5668
Geostatistical Analysis Methods for Estimation of Environmental Data Homogeneity
Published 2018-01-01“…Mathematical algorithm computing system was implemented in an object-oriented programming C #. …”
Get full text
Article -
5669
Anonymous Authentication Scheme for Intercommunication in the Internet of Things Environments
Published 2015-11-01“…Moreover, we only use low cost functions, such as hash functions and exclusive-OR operations in consideration of limited computing power of the thing.…”
Get full text
Article -
5670
Meteorological Data Analysis Using MapReduce
Published 2014-01-01“…The experimental results show that MK-means has more computing ability and scalability.…”
Get full text
Article -
5671
Recursive Delta-Operator-Based Subspace Identification with Fixed Data Size
Published 2023-01-01“…The size of the data matrices is fixed to reduce the computing load. By fading the impact of past data on future data, the amount of data storage can be decreased. …”
Get full text
Article -
5672
Research on Interactive Art Online Teaching System Based on BS Mode and Internet of Things
Published 2021-01-01Get full text
Article -
5673
Asymptotic stability of a repairable system with imperfect switching mechanism
Published 2005-01-01Get full text
Article -
5674
-
5675
Efficient Simulation Budget Allocation for Ranking the Top m Designs
Published 2014-01-01“…We consider the problem of ranking the top m designs out of k alternatives. Using the optimal computing budget allocation framework, we formulate this problem as that of maximizing the probability of correctly ranking the top m designs subject to the constraint of a fixed limited simulation budget. …”
Get full text
Article -
5676
Stability Analysis of a Population Model with Maturation Delay and Ricker Birth Function
Published 2014-01-01“…The obtained results show the existence of stability switch and provide a method of computing maturation times at which the stability switch occurs. …”
Get full text
Article -
5677
Fractal Basins of Convergence of a Seventh-Order Generalized Hénon–Heiles Potential
Published 2021-01-01“…The fractal degree is derived by computing the (boundary) basin entropy as well as the uncertainty dimension.…”
Get full text
Article -
5678
A Cleaner Production Scheduling Model with Green Investment and Pandemic Effects
Published 2024-01-01Get full text
Article -
5679
Observations of Device Orientation Decisions on Mobile Videos
Published 2015-09-01“…In this paper, we examine the robustness of existing device orientation detection method, by analyzing the motion sensor samples that are publicly available from the sensor-rich mobile video hosting website, and discuss our observation results and potential problems when computing device orientation of georeferential mobile videos.…”
Get full text
Article -
5680
Stability Analysis of the Bat Algorithm Described as a Stochastic Discrete-Time State-Space System
Published 2018-01-01“…The main problem with the soft-computing algorithms is a determination of their parameters. …”
Get full text
Article