Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
7661
Verification of Classification Model and Dendritic Neuron Model Based on Machine Learning
Published 2022-01-01Get full text
Article -
7662
Protecting Compressive Ghost Imaging with Hyperchaotic System and DNA Encoding
Published 2020-01-01“…As computational ghost imaging is widely used in the military, radar, and other fields, its security and efficiency became more and more important. …”
Get full text
Article -
7663
-
7664
An Algorithm for Improving Email Security on the Android Operating System in the Industry 4.0 Era
Published 2021-01-01Get full text
Article -
7665
Survey of Connectivity Restoration in 3D Wireless Ad Hoc/Sensor Networks
Published 2024-01-01Get full text
Article -
7666
FAB: Fast Angular Binary Descriptor for Matching Corner Points in Video Imagery
Published 2016-01-01“…Image matching is a fundamental step in several computer vision applications where the requirement is fast, accurate, and robust matching of images in the presence of different transformations. …”
Get full text
Article -
7667
Prediction of hemolytic peptides and their hemolytic concentration
Published 2025-02-01Get full text
Article -
7668
Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network
Published 2020-06-01“…As a potential technology, the identity-based online/offline encryption scheme is split into two phases (the offline phase and the online phase) which is especially suitable for sensor nodes with limited computation resources in that most of the works can be executed offline. …”
Get full text
Article -
7669
Compound Autoregressive Network for Prediction of Multivariate Time Series
Published 2019-01-01Get full text
Article -
7670
An Approach of Vulnerability Testing for Third-Party Component Based on Condition and Parameter Mutation
Published 2013-01-01Get full text
Article -
7671
A Novel FEM-Based Numerical Solver for Interactive Catheter Simulation in Virtual Catheterization
Published 2011-01-01Get full text
Article -
7672
A Survey of Insulin-Dependent Diabetes—Part I: Therapies and Devices
Published 2008-01-01“…Controlling the amount of exogenous insulin to suppress the blood glucose levels requires complicated computations. This paper mostly explains both type 1 and 2 diabetes and their mechanisms accompanied by descriptions of diabetes therapy and medical devices currently utilized in the therapy.…”
Get full text
Article -
7673
The Referenced Vertex Ordering Problem: Theory, Applications, and Solution Methods
Published 2021-08-01“…Our results highlight that the newly introduced pruning techniques allow the computation of good-quality solutions (in comparison with other solver’s solutions) while reducing the overall computational cost. …”
Get full text
Article -
7674
-
7675
Control of Power Converters for Emerging Applications of Power Electronics
Published 2016-01-01Get full text
Article -
7676
Magnifying Elements in Semigroups of Fixed Point Set Transformations Restricted by an Equivalence Relation
Published 2021-01-01Get full text
Article -
7677
-
7678
Construction of Compactly Supported Refinable Componentwise Polynomial Functions in ℝ2
Published 2011-01-01“…An iteration algorithm is developed to compute the polynomial on each component of the functions' support. …”
Get full text
Article -
7679
-
7680