Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
5701
An Infeasible Incremental Bundle Method for Nonsmooth Optimization Problem Based on CVaR Portfolio
Published 2021-01-01“…Compared with the available results, our method loosens the requirements of computing the whole constraint function, which makes the algorithm easier to implement.…”
Get full text
Article -
5702
Automatic Quantification of Immunohistochemically Stained Cell Nuclei Using Unsupervised Image Analysis
Published 1998-01-01“…A method for quantification of images of immunohistochemically stained cell nuclei by computing area proportions is presented. The image is transformed by a principal component transform. …”
Get full text
Article -
5703
Prediction of Fluid Viscosity in Multiphase Reservoir Oil System by Machine Learning
Published 2021-01-01“…And the RF model is tremendously fast in a computing time of 0.53 s. In addition, sensitivity analysis indicates that for a multiphase reservoir system, the viscosity of each phase of the reservoir is determined by different factors. …”
Get full text
Article -
5704
Study on Fluid-Induced Vibration Power Harvesting of Square Columns under Different Attack Angles
Published 2017-01-01“…The vibrational response and the quasi steady state form of the output voltage are solved by means of the matrix coefficient method and interactive computing. The results show that attack angles play an important role in the performance of square column VIVPEH, of which α=45° is a relatively ideal attack angle of square column VIVPEH.…”
Get full text
Article -
5705
Water Mitigation Effects on the Detonations in Confined Chamber and Tunnel System
Published 2001-01-01Get full text
Article -
5706
Analytic Formula for the Vibration and Sound Radiation of a Nonlinear Duct
Published 2019-01-01“…A classic method combined with Vieta’s substitution technique is adopted to develop an analytic formula for computing the nonlinear structural and acoustic responses. …”
Get full text
Article -
5707
Multigranulations Rough Set Method of Attribute Reduction in Information Systems Based on Evidence Theory
Published 2014-01-01“…However, from the granular computing point of view, the classical rough set theory is based on a single granulation. …”
Get full text
Article -
5708
A Unified Weight Formula for Calculating the Sample Variance from Weighted Successive Differences
Published 2014-01-01“…The basic formula to calculate sample variance is based on the sum of squared differences from mean. From computational perspective, mean calculation is nondesired as it can introduce computing errors. …”
Get full text
Article -
5709
SOME ITERATIVE METHODS FOR QUASI-EQUILIBRIUM PROBLEMS
Published 2012-09-01“…We show that in both extensions we obtain, under mild conditions and without a Lipschitz condition, the global convergence of our iterative methods for computing a quasi-equilibrium solution.…”
Get full text
Article -
5710
Approximate Series Solution of Nonlinear Singular Boundary Value Problems Arising in Physiology
Published 2014-01-01“…In fact, we develop the recursive scheme without any undetermined coefficients while computing the solution components. Unlike the classical ADM, the proposed method avoids solving a sequence of nonlinear algebraic or transcendental equations for the undetermined coefficients. …”
Get full text
Article -
5711
A Novel Approach for Cyclic Decompositions of Balanced Complete Bipartite Graphs into Infinite Graph Classes
Published 2022-01-01“…The results of graph theory have applications in many areas of social, computing, and natural sciences. Graph labelings and decompositions have received much attention in the literature. …”
Get full text
Article -
5712
Improved continuous enhancement routing solution for energy-aware data aggregation in wireless sensor networks
Published 2018-05-01“…To tackle these challenges, a centralized algorithm is proposed, called improved continuous enhancement routing (ICER), for computing routing trees of refined quality, based on data aggregation while being aware of the battery energy state. …”
Get full text
Article -
5713
An Improved PSO Algorithm for Distributed Localization in Wireless Sensor Networks
Published 2015-07-01“…Particle swarm optimization (PSO) is feasible for the localization problem because of its quick convergence and moderate demand for computing resources. This paper proposes a distributed two-phase PSO algorithm to solve the flip ambiguity problem, and improve the efficiency and precision. …”
Get full text
Article -
5714
Green city: An efficient task joint execution strategy for mobile micro-learning
Published 2018-06-01“…Mobile micro-learning has received extensive attention in the research of smart cities because it is a novel fusion service mode of the mobile Internet, cloud computing, and micro-learning. However, due to the explosively increased applications of the mobile micro-learning and the limited resources of mobile terminals, an effective energy saving approach for mobile micro-learning is urgently required. …”
Get full text
Article -
5715
-
5716
The Hybrid BFGS-CG Method in Solving Unconstrained Optimization Problems
Published 2014-01-01Get full text
Article -
5717
-
5718
-
5719
-
5720
Finite Difference Method for Solving a System of Third-Order Boundary Value Problems
Published 2012-01-01“…We develop a new-two-stage finite difference method for computing approximate solutions of a system of third-order boundary value problems associated with odd-order obstacle problems. …”
Get full text
Article