Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
9381
-
9382
A study on the carbon emission reduction pathways of China’s digital economy from multiple perspectives
Published 2025-01-01“…As the share of the digital economy’s output continues to rise each year, the emergence of new industries such as e-commerce, mobile payments, and cloud computing has opened new avenues for carbon emission reduction (CER). …”
Get full text
Article -
9383
Geographical Peer Matching for P2P Energy Sharing
Published 2025-01-01“…Furthermore, we propose and study analytically and empirically a spectrum of approaches to address it and perform a cost-efficient matching of peers in a computationally efficient fashion. Our experimental study, based on real-world energy data, demonstrates that our proposed solutions are efficient both in terms of cost savings achieved by the peers and in terms of communication and computing requirements. …”
Get full text
Article -
9384
Blockchain oracles for decentralized agricultural insurance using trusted IoT data
Published 2025-01-01“…Initially, a method for computing the direct reputation score of IoT devices based on behavioral and data reputation is illustrated. …”
Get full text
Article -
9385
Tracking illegal activities using video surveillance systems: a review of the current state of research
Published 2024-03-01“…It has been found that although neural networks used to require a lot of computing power, they can now be used in IoT systems and smartphones, and this contributes to the fact that more video surveillance devices can be used to monitor the situation.…”
Get full text
Article -
9386
DLCDroid an android apps analysis framework to analyse the dynamically loaded code
Published 2025-01-01Get full text
Article -
9387
-
9388
Routine malaria vaccination in Africa: a step toward malaria eradication?
Published 2025-01-01Get full text
Article -
9389
Orientation-selective spin-polarized edge states in monolayer NiI2
Published 2024-12-01“…Abstract Spin-polarized edge states in two-dimensional materials hold promise for spintronics and quantum computing applications. Constructing stable edge states by tailoring two-dimensional semiconductor materials with bulk-boundary correspondence is a feasible approach. …”
Get full text
Article -
9390
-
9391
Out-of-distribution generalization for segmentation of lymph node metastasis in breast cancer
Published 2025-01-01“…We provide the first evidence for computing equivalence margins that are data-dependent, which reduces subjectivity. …”
Get full text
Article -
9392
Experimental Comparison of HfO<sub>2/X</sub>-Based ReRAM Devices Switching Properties by the MIM Capacitance
Published 2024-01-01“…An increase in the capacitance from 3.904 to 3.917 pF/<inline-formula> <tex-math notation="LaTeX">$\mu $ </tex-math></inline-formula>m2 was observed for the same device when it was subjected to a <inline-formula> <tex-math notation="LaTeX">$144~\mu $ </tex-math></inline-formula>s pulse width, demonstrating a conductance quantization required for the application in in-memory computing systems. Also, the dielectric constant modulates due to the migration of oxygen atoms inside the device’s insulator.…”
Get full text
Article -
9393
Frozen Jacobian Multistep Iterative Method for Solving Nonlinear IVPs and BVPs
Published 2017-01-01“…Frozen Jacobian multistep iterative methods are computationally very efficient. They require only one inversion of the Jacobian in the form of LU-factorization. …”
Get full text
Article -
9394
Application of WiMAX technology in difficult geographical conditions: Perspectives for mountain environment
Published 2025-01-01“…From a server to a pocket computer, almost any personal device that has enough computing power to process text and graphic information is equipped with one or another network interface, from a modem to WiMAX. …”
Get full text
Article -
9395
TS-PAID: A Two-Stage PUF-Based Lightweight Authentication Protocol for Internet of Drones
Published 2025-01-01“…Owing to energy, storage and computational resource-constraints, the complex and heavy cryptographic solutions could not be directly deployed in IoD environment. …”
Get full text
Article -
9396
-
9397
-
9398
Sign Problem in Tensor-Network Contraction
Published 2025-01-01“…We investigate how the computational difficulty of contracting tensor networks depends on the sign structure of the tensor entries. …”
Get full text
Article -
9399
Enhanced IoT-Based Face Mask Detection Framework Using Optimized Deep Learning Models: A Hybrid Approach With Adaptive Algorithms
Published 2025-01-01“…So that the model can take full advantage of computing capacity and still operate in real time on devices with limited resources. …”
Get full text
Article -
9400
A Modified Nonlinear Damage Accumulation Model for Fatigue Life Prediction Considering Load Interaction Effects
Published 2014-01-01“…Comparison between the predicted cumulative damage by the proposed model and an existing model shows that the proposed model predictions can meet the accuracy requirement of the engineering project and it can be used to predict the fatigue life of welded aluminum alloy joint of Electric Multiple Units (EMU); meanwhile, the accuracy of approximation can be obtained from the proposed model though more simple computing process and less material parameters calling for extensive testing than the existing model.…”
Get full text
Article