Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
8901
The Bifurcation Curves of a Category of Dirichlet Boundary Value Problems
Published 2022-01-01“…We prove first that all positive solutions of the first problem are less than or equal to σ, obtain more specific lower and upper bounds for these solutions, and compute a curve in the σK -plane with accuracy up to 10−6, below which the first problem has a unique positive solution and above which it has exactly three positive solutions. …”
Get full text
Article -
8902
A-priori multi-objective optimization for the short-term dispatch of distributed energy resources
Published 2025-03-01“…The obtained results demonstrate the high accuracy and low computational effort of the proposed method, indicate the most accurate SWM in the specific application, and show the effectiveness of the proposal with respect to other MOO approaches.…”
Get full text
Article -
8903
A randomized block policy gradient algorithm with differential privacy in Content Centric Networks
Published 2021-12-01“…Current policy gradient algorithms impose high computational cost in processing high-dimensional data. …”
Get full text
Article -
8904
The Projective Character Tables of a Solvable Group 26:6×2
Published 2019-01-01“…The method presented here is very effective to compute the irreducible projective character tables of a finite soluble group of manageable size.…”
Get full text
Article -
8905
Modelling and Neuro-Adaptive Robust Control Algorithms for Solid Fuel Rockets
Published 2025-01-01“…The method involves mathematical and computational modelling, together with the design of adaptive controllers for stability and performance analysis. …”
Get full text
Article -
8906
An Approximate Cone Beam Reconstruction Algorithm for Gantry-Tilted CT Using Tangential Filtering
Published 2006-01-01“…FDK algorithm is a well-known 3D (three-dimensional) approximate algorithm for CT (computed tomography) image reconstruction and is also known to suffer from considerable artifacts when the scanning cone angle is large. …”
Get full text
Article -
8907
A Comprehensive Study on Gamma Rays and Fast Neutron Sensing Properties of GAGOC and CMO Scintillators for Shielding Radiation Applications
Published 2017-01-01“…The geometrical progression (G-P) method has been used to compute the exposure buildup factors (EBF) and gamma ray energy absorption (EABF) in the photon energy range 0.015–15 MeV and up to a 40 penetration depth (mfp). …”
Get full text
Article -
8908
Distributed SLAM Using Improved Particle Filter for Mobile Robot Localization
Published 2014-01-01“…The distributed SLAM system has a similar estimation performance and requires only one-fifth of the computation time compared with centralized particle filter. …”
Get full text
Article -
8909
EXPLORING ISLAMIC HISTORY IN THE DIGITAL AGE THROUGH VIDEO GAMES: AN INTRODUCTORY ANALYSIS WITHIN THE FRAMEWORK OF KNIGHTS OF THE LIGHT
Published 2024-03-01“…This article analyses the computer game ‘Knights of the Light: The Prologue,’ which focuses on a theme from the early periods of Islamic history, and evaluates its role in the teaching and learning Islamic history. …”
Get full text
Article -
8910
How users organize electronic files on their workstations in the office environment: a preliminary study of personal information organization behaviour
Published 2007-01-01“…An ongoing study of how people organize their computer files and folders on the hard disk of their office workstations. …”
Get full text
Article -
8911
Customized Bus Route Optimization with the Real-Time Data
Published 2020-01-01“…The results indicate that the real-time route optimization can be achieved within the computation time of 0.17–0.38 seconds.…”
Get full text
Article -
8912
Evaluation of a Telemedicine System for the Transmission of Morpho/Immunological Data Aiming at the Inclusion of Patients in a Therapeutic Trial
Published 2009-01-01“…The advantages were (1) the creation of a unique, protected, stable data bank that could be remotely consulted, (2) the use of digitized pictures which made expertise on identical documents possible, (3) the facility of computer exchanges between experts, in terms of reception as well as replying time delays. …”
Get full text
Article -
8913
DS-SwinUNet: Redesigning Skip Connection With Double Scale Attention for Land Cover Semantic Segmentation
Published 2025-01-01“…In recent years, the development of visual transformer has gradually replaced convolutional neural networks in the visual domain with attention computation, causing pure transformer networks to become a trend. …”
Get full text
Article -
8914
Efficient Blocked Fractional Factorial Designs for Stated Choice Experiments of Size Two and Four
Published 2023-01-01“…The computed efficiencies for the proposed designs reveal that 4 choice sets of size 4 designs are more efficient. …”
Get full text
Article -
8915
Application of Improved Dynamic Substructure Finite Element Model-Based State-Space Techniques in Mistuned Blisks
Published 2020-01-01“…Previously, one sector taken as the research object is not suitable; the integrally mistuned bladed disk (blisk) is taken as the research object is very necessary; however, the computational efficiency of mistuned blisk is very low. …”
Get full text
Article -
8916
Advancements and Challenges in Character Recognition: A Comparative Analysis of CNN and Deep Learning Approaches
Published 2025-01-01“…Future research should focus on integrating supportive methods to improve segmentation and finding an optimal trade-off between variable complexity and computational efficiency, thereby advancing the practical application of character recognition systems across various domains.…”
Get full text
Article -
8917
Ischemic Changes in the Mucous Membrane of the Transverse Colon as a Complication of Acute Pancreatitis
Published 2023-02-01“…A thorough analysis of the results of computed tomography at the first signs of colon lesion and colonoscopy contributed to the rapid detection of complications and prevention of irreversible colon ischemia.…”
Get full text
Article -
8918
Memoryless Systems Generate the Class of all Discrete Systems
Published 2019-01-01“…Indeed, both modern computers and biological systems can be described in this way, as assemblies of transistors or assemblies of simple cells. …”
Get full text
Article -
8919
Statistical Inferences to the Parameter and Reliability Characteristics of Gamma-mixed Rayleigh Distribution under Progressively Censored Data with Application
Published 2025-02-01“…The sufficient condition for the existence and uniqueness of the maximum likelihood estimates (MLE) is obtained. We compute MLEs using the expectation-maximization (EM) algorithm. …”
Get full text
Article -
8920
Spatio-Temporal Joint Trajectory Planning for Autonomous Vehicles Based on Improved Constrained Iterative LQR
Published 2025-01-01“…The experiment’s results demonstrate a significant increase in human-like driving indicators by 16.35% and a 12.65% average increase in traffic efficiency, reducing computation time by 39.29%.…”
Get full text
Article