Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
7321
Existence of Solutions for Boundary Value Problem of a Caputo Fractional Difference Equation
Published 2015-01-01Get full text
Article -
7322
Cell Area-Based Method for Analyzing the Coverage Capacity of Satellite Constellations
Published 2021-01-01“…The classical net point method is one of the most commonly used algorithms in resolving this problem, indicating that the computation efficiency significantly depends on the high-precision requirement. …”
Get full text
Article -
7323
Blended Features Classification of Leaf-Based Cucumber Disease Using Image Processing Techniques
Published 2021-01-01Get full text
Article -
7324
Pattern Formation in a Reaction-Diffusion Predator-Prey Model with Weak Allee Effect and Delay
Published 2019-01-01Get full text
Article -
7325
The Use of Different Image Recognition Techniques in Food Safety: A Study
Published 2021-01-01“…This article outlines the essential parts of a computer vision system. In order to avoid foodborne disease and ensure food security, fast and effective detection of pathogenic microorganisms is crucial for public safety biomonitoring. …”
Get full text
Article -
7326
Bounded Model Checking of ETL Cooperating with Finite and Looping Automata Connectives
Published 2013-01-01Get full text
Article -
7327
Calculating norms in the spaces l∞(Γ)/c0(Γ) and l∞(Γ)/c(Γ)
Published 1998-01-01“…We explicitly compute norms in the quotient spaces l∞(Γ)/c0(Γ) and l∞(Γ)/c(Γ).…”
Get full text
Article -
7328
Experience of automated design of rigging in the Chief Metallurgist department of Minsk Tractor plant
Published 2001-08-01“…The authors of the article describe changes in preparation process of cast parts manufacture caused by application of three-dimension computer design.…”
Get full text
Article -
7329
EXPERIMENTAL INVESTIGATIONS OF THE PROCESS OF ROLLING STRIPS OF VARIABLE THICKNESS WITH A LOCAL BEND
Published 2015-04-01“…The results of computer simulation and experimental investigations of the rolling process of strip blanks on the profiled mandrel using two processing schemes…”
Get full text
Article -
7330
Double-coset enumeration algorithm for symmetrically generated groups
Published 2005-01-01“…A double-coset enumeration algorithm for groups generated by symmetric sets of involutions together with its computer implementation is described.…”
Get full text
Article -
7331
Fast forward modeling and response analysis of extra-deep azimuthal resistivity measurements in complex model
Published 2025-01-01“…By leveraging the symmetry of simulated signals in the spectral domain, the algorithm reduces computation time by 50%, significantly enhancing computational efficiency while preserving accuracy. …”
Get full text
Article -
7332
A Water Management Model for Toshka Depression
Published 2014-01-01“…In order to provide the required assessment quantitatively, we developed a numerical model which computes TD mass balance and interbasin water movements. …”
Get full text
Article -
7333
Protect or prevent? A practicable framework for the dilemmas of COVID-19 vaccine prioritization.
Published 2025-01-01“…Answering such questions often becomes computationally intractable given that network size can exceed millions. …”
Get full text
Article -
7334
A Polynomial-Time Algorithm for Detection of Uncovered Transitions in a Petri Net-Based Concurrent System
Published 2025-01-01“…The proposed method is based on the computation of transition invariant coverage to detect possible errors in the modelled system. …”
Get full text
Article -
7335
TAS Scheduling With Grouping Flows
Published 2025-01-01“…This paper proposes a method to reduce the computational complexity of TAS schedules for the problem that the computation time increases exponentially as the amount of scheduled traffic (ST) flows increases. …”
Get full text
Article -
7336
Three-Dimensional Microwave Imaging for Concealed Weapon Detection Using Range Stacking Technique
Published 2017-01-01“…Finally, the proposed method is validated through extensive computer simulations and real-field experiments. The results show that accurate 3D image can be generated at a very high speed by utilizing the proposed algorithm.…”
Get full text
Article -
7337
Simulating the Emergence and Survival of Mutations Using a Self Regulating Multitype Branching Processes
Published 2011-01-01“…During the lifespan of Fisher, computer technology had not advanced to a point at which it became an effective tool for simulating the phenomenon of the emergence and survival of mutations, but given the wide availability of personal desktop and laptop computers, it is now possible and financially feasible for investigators to perform Monte Carlo Simulation experiments. …”
Get full text
Article -
7338
Development of Integrated Choice and Latent Variable (ICLV) Models Using Matrix-Based Analytic Approximation and Automatic Differentiation Methods on TensorFlow Platform
Published 2022-01-01“…It is found that the parameter estimates and standard error estimates are acceptable for both models and the computational time is expected to decrease using tensor data structures on the TensorFlow platform. …”
Get full text
Article -
7339
An Analytical Method for Determining the Bottom-Hole Pressure of Vertical Well With Multiple Fractures
Published 2024-01-01“…Sequentially, the validations of computational method and computational codes contain are presented. …”
Get full text
Article -
7340
A Combination of Classification Robust Adaptive Kalman Filter with PPP-RTK to Improve Fault Detection for Integrity Monitoring of Autonomous Vehicles
Published 2025-01-01“…The method reduced FDE computational load by 50–99.999% compared to other approaches.…”
Get full text
Article