Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
7241
Design and Optimization of an EBG Antenna with an Efficient Electromagnetic Solver
Published 2012-01-01Get full text
Article -
7242
-
7243
Multisegment Mapping Network for Massive MIMO Detection
Published 2021-01-01“…Because of the large number of massive MIMO antennas, the computational complexity of detection has increased significantly, which poses a significant challenge to traditional detection algorithms. …”
Get full text
Article -
7244
An Efficient Convolution Algorithm for the Non-Markovian Two-Node Cyclic Network
Published 2021-01-01“…This model has several other applications in performance evaluation, manufacturing, computer networks, and in reliability studies as it can be easily used to compute system availability. …”
Get full text
Article -
7245
A Fast CT Reconstruction Scheme for a General Multi-Core PC
Published 2007-01-01“…Expensive computational cost is a severe limitation in CT reconstruction for clinical applications that need real-time feedback. …”
Get full text
Article -
7246
A Novel Decentralized Scheme for Cooperative Compressed Spectrum Sensing in Distributed Networks
Published 2015-08-01“…Compressed sensing (CS) recently turns out to be an effective approach to alleviate the sampling bottleneck in wideband spectrum sensing. However, the computation overhead incurred by compressed reconstruction is nontrivial, especially in a power-constrained cognitive radio (CR). …”
Get full text
Article -
7247
Estimation of the Compressive Strength of Self-Compacting Concrete (SCC) by a Machine Learning Technique Coupling with Novel Optimization Algorithms
Published 2023-03-01“…Consequently, the R2 in the testing stage for SVR-HGSO was computed at 0.90 and for SVR-PSO, 0.93. In the calibration phase, the correlation rate was computed at 0.93 for SVR-HGSO with a 3% difference from the SVR-PSO with 0.90.…”
Get full text
Article -
7248
The Use of the Direct Optimized Probabilistic Calculation Method in Design of Bolt Reinforcement for Underground and Mining Workings
Published 2013-01-01“…Using this theory, it is possible to apply probabilistic computations based on the probability theory and mathematic statistics. …”
Get full text
Article -
7249
An Efficient Secure Data Aggregation Based on Homomorphic Primitives in Wireless Sensor Networks
Published 2014-01-01“…Existing solutions either have large communication and computation overheads or only produce inaccurate results. …”
Get full text
Article -
7250
Modeling and Analysis of HIV and Cholera Direct Transmission with Optimal Control
Published 2022-01-01“…The endemic equilibrium point of the HIV and cholera model is computed, and stability property is shown with numerical simulations. …”
Get full text
Article -
7251
Intraocular Silicone Oil Masquerading as Terson Syndrome
Published 2016-01-01“…Intraocular hemorrhage in Terson syndrome may be diagnosed using computed tomography but there are false positive results. …”
Get full text
Article -
7252
Scalable Context-Based Facial Emotion Recognition Using Facial Landmarks and Attention Mechanism
Published 2025-01-01“…Deciphering emotions from a person’s perspective is critical for meaningful human relationships. Enabling computers to interpret emotional cues similarly could significantly improve human-machine interaction. …”
Get full text
Article -
7253
METHODOLOGY FOR DATA COLLECTION IN SIMULATED IRRADIATIONS USING MONTE CARLO TECHNIQUES ON DICOM IMAGES FOR X-RAY FLUORESCENCE EMISSIONS LOCALIZATION IN HIGH ATOMIC NUMBER MATERIALS
Published 2024-12-01“…X-ray Fluorescence Computed Tomography (XFCT) has emerged as a promising modality owing to the availability of high-energy polychromatic X-ray sources in the laboratory. …”
Get full text
Article -
7254
Prediction of Pollutant Emissions from Bluff-Body Stabilised Nonpremixed Flames
Published 2018-01-01“…The computed values are in reasonably good agreement with the experimental data. …”
Get full text
Article -
7255
C3DGS: Compressing 3D Gaussian Model for Surface Reconstruction of Large-Scale Scenes Based on Multiview UAV Images
Published 2025-01-01“…Because the number of 3D Gaussians increases dramatically, leading to significant computational requirement and limiting the fineness of surface reconstruction. …”
Get full text
Article -
7256
Emergence of a Snake-Like Structure in Mobile Distributed Agents: An Exploratory Agent-Based Modeling Approach
Published 2014-01-01“…In contrast, current computer animations as well as physical implementations of snake-like autonomous structures are typically designed to use either a single or a relatively smaller number of components. …”
Get full text
Article -
7257
-
7258
Patient-Specific Coronary Artery 3D Printing Based on Intravascular Optical Coherence Tomography and Coronary Angiography
Published 2019-01-01“…In this work, the application value of 3D printing technology in the treatment of cardiovascular diseases has been explored via comparison study between the 3D printed vascular solid model and the computer aided design (CAD) model. In this paper, a new framework is proposed to achieve a 3D printing vascular model with high simulation. …”
Get full text
Article -
7259
A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security
Published 2025-01-01“…Abstract Adversarial attacks were commonly considered in computer vision (CV), but their effect on network security apps rests in the field of open investigation. …”
Get full text
Article -
7260
Highly Strained AlGaAs‐GaAsP Nanomembranes‐Based High‐Performance Diode
Published 2025-02-01Get full text
Article