Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
7021
Correlators of the symmetric product orbifold
Published 2020-01-01“…We comment on the consequences of our computation for the AdS3/CFT2 correspondence.…”
Get full text
Article -
7022
The G-Asymptotic Tracking Property and G-Asymptotic Average Tracking Property in the Inverse Limit Spaces under Group Action
Published 2021-01-01“…The results obtained improve the conclusions of asymptotic tracking property, asymptotic average tracking property, and quasi-weak almost-periodic point in the inverse limit space and provide the theoretical basis and scientific foundation for the application of tracking property in computational mathematics, biological mathematics, and computer science.…”
Get full text
Article -
7023
First Hitting Place Probabilities for a Discrete Version of the Ornstein-Uhlenbeck Process
Published 2009-01-01“…The probability that the process hits N before 0 is computed explicitly. Similarly, the probability that the process hits N before −M is computed in the case when the state space is {−M,…,0,…,N} and the transition probabilities pi,i+1 are not necessarily the same when i is positive and i is negative.…”
Get full text
Article -
7024
RADAR SIMULATION USING GPU-BASED TEXTURE MAPPING
Published 2017-06-01“…However, this work is complicated with heavy computation. Thus, this paper proposed a GPU-based method to simulate the contents and effects of a working radar screen. …”
Get full text
Article -
7025
Contrast Expansion Method for Elastic Incompressible Fibrous Composites
Published 2017-01-01“…Contrast parameter expansion of the elastic fields for 2D composites is developed by Schwarz’s method and by the method of functional equations for the case of circular inclusions. A computationally efficient algorithm is described and implemented in symbolic form to compute the local fields in 2D elastic composites and the effective shear modulus for macroscopically isotropic composites. …”
Get full text
Article -
7026
Numerical Solution of Fractional Order Anomalous Subdiffusion Problems Using Radial Kernels and Transform
Published 2021-01-01“…The computation can be done in parallel and no time sensitivity is involved in approximating the time fractional operator as contrary to finite differences. …”
Get full text
Article -
7027
-
7028
Noise-agnostic quantum error mitigation with data augmented neural models
Published 2025-01-01Get full text
Article -
7029
-
7030
-
7031
Prediction Score for Cervical Spine Fracture in Patients with Traumatic Neck Injury
Published 2021-01-01“…Diagnostic imaging in developing countries has several limitations. A computed tomography scan is not available 24 hours and not cost-effective. …”
Get full text
Article -
7032
A Survey of Artificial Immune System Based Intrusion Detection
Published 2014-01-01“…In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. …”
Get full text
Article -
7033
Modeling shrimp biomass and viral infection for production of biological countermeasures
Published 2006-07-01Get full text
Article -
7034
Enhancing cardiac diagnostics: a deep learning ensemble approach for precise ECG image classification
Published 2025-01-01Get full text
Article -
7035
Intelligent two-phase dual authentication framework for Internet of Medical Things
Published 2025-01-01“…The results show that encryption/decryption time is reduced by over 45%, overall computational cost by 45.38%, and latency by 28.42% over existing approaches. …”
Get full text
Article -
7036
An efficient PG-INLA algorithm for the Bayesian inference of logistic item response models
Published 2025-01-01“…The proposed PG-INLA algorithm utilizes a computationally efficient data augmentation strategy via the Pólya-Gamma variables, which can avoid low computational efficiency of traditioanl Bayesian MCMC algorithms for IRT models with a logistic link function. …”
Get full text
Article -
7037
Modeling and Simulation of Wake Safety Interval for Paired Approach Based on CFD
Published 2021-01-01“…This method realized visual analysis of wake vortex through optimization modeling based on computational fluid dynamics, contributing to increasing the capacity of the runway and improving the operation efficiency of an aerodrome.…”
Get full text
Article -
7038
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
Published 2021-01-01“…This scheme requires a quite low computational cost when both signing and verifying a data packet. …”
Get full text
Article -
7039
PEM-PCA: A Parallel Expectation-Maximization PCA Face Recognition Architecture
Published 2014-01-01“…However, the covariance matrix and eigenvalue decomposition stages cause high computational complexity, especially for a large database. …”
Get full text
Article -
7040
Pulmonary embolism. A case report
Published 2010-12-01“…The posterior to anterior chest X-ray showed opacities in the form of a veil at the base of the left hemithorax as well as increased cardiothoracic rates. A lung computed tomography angiography scan was performed using a SIEMENS SESATION 64 multislice computed tomography scanner. …”
Get full text
Article