Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
5721
A flexible continuous-wave quantum cryptography scheme with zero-trust security for Internet of Things
Published 2022-11-01“…As quantum computing techniques develop rapidly, the security of classical communication, which is usually based on public key encryption algorithm, is under great threat. …”
Get full text
Article -
5722
Medical Pattern Recognition: Applying an Improved Intuitionistic Fuzzy Cross-Entropy Approach
Published 2012-01-01“…Furthermore, in order to make computing and ranking results easier and to increase the recruiting productivity, a computer-based interface system has been developed to support doctors in making more efficient judgments.…”
Get full text
Article -
5723
Screening length of a heavy quark–antiquark pair in non-commutative plasma
Published 2024-12-01“…We perform the analysis by computing the Wilson loop in a boosted background and consider the axis of the $$Q{\bar{Q}}$$ Q Q ¯ pair along different directions. …”
Get full text
Article -
5724
Investigation and Analysis of the Simultaneous Switching Noise in Power Distribution Network with Multi-Power Supplies of High Speed CMOS Circuits
Published 2017-01-01“…This paper presents a method of computing the simultaneous switching noise through a switching current, whose properties and details are described. …”
Get full text
Article -
5725
-
5726
Synchronization for a Class of Fractional-Order Hyperchaotic System and Its Application
Published 2012-01-01Get full text
Article -
5727
Decision Analysis via Granulation Based on General Binary Relation
Published 2007-01-01“…In this paper, we introduce a generalization and modification of decision-theoretic rough set model by using granular computing on general binary relations. We obtain two new types of approximation that enable us to classify the objects into five regions instead of three regions. …”
Get full text
Article -
5728
Social Disciplines and humanities in Engineering Training in the Context of the FSES 3++
Published 2019-06-01“…The article considers the possibilities of the development of universal competencies in approximate basic educational programmes taking the project in the educational direction of 03.09.01 “Computer science and computing” as an example. The importance of social disciplines and humanities to form universal competences is noted. …”
Get full text
Article -
5729
Image Restoration Based on the Hybrid Total-Variation-Type Model
Published 2012-01-01Get full text
Article -
5730
Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems
Published 2022-04-01“…In a smart grid, there are massive data to be processed, so cloud computing is introduced into it to form a cloud-based smart grid data management system. …”
Get full text
Article -
5731
Metagenome-assembled-genomes recovered from the Arctic drift expedition MOSAiC
Published 2025-02-01Get full text
Article -
5732
Impacts of benchmarking choices on inferred model skill of the Arctic–Boreal terrestrial carbon cycle
Published 2025-01-01Get full text
Article -
5733
Search for Neutrino Signals Correlated with LHAASO Diffuse Galactic Emission
Published 2025-01-01Get full text
Article -
5734
Devil’s Vortex Phase Structure as Frequency Plane Mask for Image Encryption Using the Fractional Mellin Transform
Published 2014-01-01“…The efficacy of the scheme has been evaluated by computing mean-squared-error between the secret target image and the decrypted image. …”
Get full text
Article -
5735
A SIC and ML approach for MIMO non-orthogonal multiple access signal detection
Published 2025-02-01Get full text
Article -
5736
An Optimized Parallel FDTD Topology for Challenging Electromagnetic Simulations on Supercomputers
Published 2015-01-01“…The performance of the method is tested and analyzed on three high performance computing platforms with different architectures in China. …”
Get full text
Article -
5737
A Novel Optimization-Based Approach for Content-Based Image Retrieval
Published 2013-01-01Get full text
Article -
5738
Perceptual Mapping-Based Image Tamper Detection and Recovery Algorithm
Published 2022-01-01Get full text
Article -
5739
An Overview of Agent-Based Models for Transport Simulation and Analysis
Published 2022-01-01“…Besides, we point out some limitations in terms of calibration and validation procedure, agents’ behavior modeling, and computing efficiency. In conclusion, some recommendations are given and suggest potential and insightful directions such as Big Data and Digital Twin for future research.…”
Get full text
Article -
5740
A Two-Layer Architecture for Failure Prediction Based on High-Dimension Monitoring Sequences
Published 2021-01-01“…A distributed system is comprised of many computing nodes of different components which are connected by high-speed communication networks. …”
Get full text
Article