Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
5741
Realization of a spin-1/2 Kondo necklace model with magnetic field-induced coupling switch
Published 2025-01-01“…This offers other opportunities for quantum technologies, particularly in the development of tunable qubits for quantum computing and spintronic devices, where precise control over spin interactions is essential.…”
Get full text
Article -
5742
-
5743
-
5744
Lighting the way forward: The bright future of photonic integrated circuits
Published 2025-01-01“…Integrated optics, a key photonics technology, has major implications for telecommunications, sensing, and computing. By integrating optical elements like lasers, modulators, and detectors onto a single chip, it enhances performance while reducing the size, weight, and power of optical systems. …”
Get full text
Article -
5745
-
5746
Modeling a Solution for Smart Space Planning Aiming for Energy Efficiency in Industry 4.0
Published 2024-04-01“…The integration of smart technologies emerges as a promising alternative, prompting a critical examination of how computing resources, equipment, and components can be strategically arranged within these environments. …”
Get full text
Article -
5747
Performance Evaluation and Estimation of Energy Measures of Grid-Connected PV Module
Published 2022-01-01Get full text
Article -
5748
Financial Data Anomaly Detection Method Based on Decision Tree and Random Forest Algorithm
Published 2022-01-01“…The fast-developing computer network not only brings convenience to people but also brings security problems to people due to the appearance of various abnormal flows. …”
Get full text
Article -
5749
Coarse-Grained Column Agglomeration Parallel Algorithm for LU Factorization Using Multi-Threaded MATLAB
Published 2025-01-01“…MATLAB programing language is one of the most popular scientific computing tools, especially for solving linear algebra problems. …”
Get full text
Article -
5750
Discovering and Characterizing Hidden Variables Using a Novel Neural Network Architecture: LO-Net
Published 2011-01-01“…We claim that theoretical entities, or hidden variables, are important for the development of concepts within the lifetime of an individual and present a novel neural network architecture that solves three problems related to theoretical entities: (1) discovering that they exist, (2) determining their number, and (3) computing their values. Experiments show the utility of the proposed approach using discrete time dynamical systems, in which some of the state variables are hidden, and sensor data obtained from the camera of a mobile robot, in which the sizes and locations of objects in the visual field are observed but their sizes and locations (distances) in the three-dimensional world are not. …”
Get full text
Article -
5751
Bit-Table Based Biclustering and Frequent Closed Itemset Mining in High-Dimensional Binary Data
Published 2014-01-01Get full text
Article -
5752
Lung cancer Prediction and Classification based on Correlation Selection method Using Machine Learning Techniques
Published 2021-05-01“…Lung cancer has a low prognosis, resulting in a high death rate. The computing sector is fully automating it, and the medical industry is also automating itself with the aid of image recognition and data analytics. …”
Get full text
Article -
5753
Plasma and BIAS Modeling: Self-Consistent Electrostatic Particle-in-Cell with Low-Density Argon Plasma for TiC
Published 2011-01-01“…We propose instead a Particle-in-cell (PIC) method, which allows the study of plasma behavior by computing the trajectories of finite-size particles under the action of an external and self-consistent electric field defined in a grid of points.…”
Get full text
Article -
5754
Importance of Activation Energy on Magnetized Dissipative Casson-Maxwell Fluid through Porous Medium Incorporating Chemical Reaction, Joule Heating, and Soret Effects: Numerical St...
Published 2024-01-01“…The method transforms partial differential equations originating in fluidic systems into nonlinear differential equation systems with the proper degree of similarity which is subsequently resolved utilizing the Lobatto IIIA technique’s powerful computing capabilities. It is important to recall that the velocity profile drops as the Maxwell fluid parameter increases. …”
Get full text
Article -
5755
Preparing Schrödinger Cat States in a Microwave Cavity Using a Neural Network
Published 2025-01-01“…Scaling up quantum computing devices requires solving ever more complex quantum control tasks. …”
Get full text
Article -
5756
-
5757
The (De)confinement Transition in Tachyonic Matter at Finite Temperature
Published 2019-01-01“…This method is suitable for analytically computing the resulting potential, glueball masses, and the string tension associated with the confinement at a finite temperature. …”
Get full text
Article -
5758
An Efficient Series Solution for Fractional Differential Equations
Published 2014-01-01“…The new approach is a modified form of the well-known Taylor series expansion where we overcome the difficulty of computing iterated fractional derivatives, which do not compute in general. …”
Get full text
Article -
5759
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Published 2023-01-01“…Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. Although the authors claimed that RBFK is secure against differential cryptanalysis, linear cryptanalysis, impossible differential attack, and zero correlation linear cryptanalysis, the details were not explained in the literature. …”
Get full text
Article -
5760