Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
7641
Three-dimension mathematical simulation thermal stress condition of a steel part
Published 2001-11-01“…The computer method of simulation of thermal stress condition of three-dimension parts is suggested. …”
Get full text
Article -
7642
Alternative casting technologies at the gas-tuibine complex “Zorja” -“Mashinproject”
Published 2003-08-01“…There are given the results of computer modeling of the process of the foundry details production, the analysis of efficiency of working of the foundry modeling system, carried out comparison of the results of the theoretical and experimental investigations.…”
Get full text
Article -
7643
Asymptotic Stability of Differential Equations with Infinite Delay
Published 2012-01-01“…A theorem on asymptotic stability is obtained for a differential equation with an infinite delay in a function space which is suitable for the numerical computation of the solution to the infinite delay equation.…”
Get full text
Article -
7644
-
7645
A Vortex Identification Method Based on Extreme Learning Machine
Published 2020-01-01“…Global vortex identification methods are of high computational complexity and time-consuming. Machine learning methods are related to the size and shape of the flow field, which are weak in versatility and scalability. …”
Get full text
Article -
7646
The estimation of the effective reproductive number from disease outbreak data
Published 2009-02-01Get full text
Article -
7647
Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks
Published 2012-04-01Get full text
Article -
7648
-
7649
An IoT-Based Automatic Vehicle Accident Detection and Visual Situation Reporting System
Published 2024-01-01Get full text
Article -
7650
Adaptive Navigating Control Based on the Parallel Action-Network ADHDP Method for Unmanned Surface Vessel
Published 2019-01-01Get full text
Article -
7651
A Fast Density-Based Clustering Algorithm for Real-Time Internet of Things Stream
Published 2014-01-01“…Experimental results show that the proposed approach obtains high quality results with low computation time on real and synthetic datasets.…”
Get full text
Article -
7652
-
7653
Development of a Low Cost Assistive Listening System for Hearing-Impaired Student Classroom
Published 2013-01-01Get full text
Article -
7654
An Improved Deep Belief Network IDS on IoT-Based Network for Traffic Systems
Published 2022-01-01Get full text
Article -
7655
Fire Video Recognition Based on Local and Global Adaptive Enhancement
Published 2025-01-01“…In the domain of fire warning, earlier approaches leveraging computer vision have achieved significant progress. …”
Get full text
Article -
7656
Promoting Geospatial Service from Information to Knowledge with Spatiotemporal Semantics
Published 2019-01-01Get full text
Article -
7657
A Trusted Federated Learning Method Based on Consortium Blockchain
Published 2024-12-01“…This method leverages computational power registration to group participants with similar resources into private chains and employs cross-chain communication with a central management chain to ensure efficient and secure model aggregation. …”
Get full text
Article -
7658
Simulation Study of Swarm Intelligence Based on Life Evolution Behavior
Published 2015-01-01“…Swarm intelligence (SI) is a new evolutionary computation technology, and its performance efficacy is usually affected by each individual behavior in the swarm. …”
Get full text
Article -
7659
An Obstacle Avoidance Scheme Maintaining Connectivity for Micro-Unmanned Aerial Vehicles
Published 2014-04-01Get full text
Article -
7660
Simulating Crowd Evacuation in a Social Force Model with Iterative Extended State Observer
Published 2020-01-01Get full text
Article