Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
9521
-
9522
Implementation of Solar Heat Energy and Adsorption Cooling Mechanism for Milk Pasteurization Application
Published 2022-01-01Get full text
Article -
9523
Color Confinement, Hadron Dynamics, and Hadron Spectroscopy from Light-Front Holography and Superconformal Algebra
Published 2018-01-01“…The QCD light-front Hamiltonian equation HLFΨ=M2Ψ derived from quantization at fixed LF time τ=t + z/c provides a causal, frame-independent method for computing hadron spectroscopy as well as dynamical observables such as structure functions, transverse momentum distributions, and distribution amplitudes. …”
Get full text
Article -
9524
Modelling the Transmission Dynamics of Meningitis among High and Low-Risk People in Ghana with Cost-Effectiveness Analysis
Published 2022-01-01“…Thus, this article develops a mathematical model that ascertains the dynamics involved in meningitis transmissions by partitioning individuals into low- and high-risk susceptible groups. After computing the basic reproduction number, the model is shown to exhibit a unique local asymptotically stability at the meningitis-free equilibrium E†, when the effective reproduction number R0<1, and the existence of two endemic equilibria for which R0†<R0<1 and exhibits the phenomenon of backward bifurcation, which shows the difficulty of relying only on the reproduction number to control the disease. …”
Get full text
Article -
9525
HISS: Snakemake-based workflows for performing SMRT-RenSeq assembly, AgRenSeq and dRenSeq for the discovery of novel plant disease resistance genes
Published 2023-05-01“…Since the initial publication of the methodology, it has continued to be developed as new technologies have become available and the increased availability of computing power has made new bioinformatic approaches possible. …”
Get full text
Article -
9526
SCovid v2.0: a comprehensive resource to decipher the molecular characteristics across tissues in COVID-19 and other human coronaviruses
Published 2025-02-01“…ABSTRACT SCovid v2.0 (http://bio-annotation.cn/scovid or http://bio-computing.hrbmu.edu.cn/scovid/) is an updated database designed to assist researchers in uncovering the molecular characteristics of coronavirus disease 2019 (COVID-19) across various tissues through transcriptome sequencing. …”
Get full text
Article -
9527
Modeling saturation exponent of underground hydrocarbon reservoirs using robust machine learning methods
Published 2025-01-01“…Abstract Precise estimation of rock petrophysical parameters are seriously important for the reliable computation of hydrocarbon in place in the underground formations. …”
Get full text
Article -
9528
Research on(t,k)-diagnosability for exchanged hypercube network
Published 2016-03-01“…Fault diagnosis was an important part in the processing of network system repair.PMC was a diagnosis model which was simple and easy to be understood.Through analysis of the structure of exchanged hypercube,a generalization measure of fault diagnosis for the network system was provided,called (t,k)-fault diagnosis method.By computing,it is shown that EH(s,p) is <math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow> <mo>( </mo> <mrow> <msup> <mn>2 </mn> <mrow> <mfrac> <mrow> <mi>s </mi> <mo>+ </mo> <mi>p </mi> <mo>− </mo> <mn>1 </mn> </mrow> <mn>2 </mn> </mfrac> </mrow> </msup> <mo>,</mo> <mi>s </mi> <mo>+ </mo> <mn>1 </mn> </mrow> <mo>) </mo> </mrow> </math>-diagnosable and conditional <math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow> <mo>( </mo> <mrow> <mfrac> <mrow> <msup> <mn>2 </mn> <mrow> <mi>s </mi> <mo>+ </mo> <mi>p </mi> <mo>+ </mo> <mn>1 </mn> </mrow> </msup> <mo>− </mo> <mn>2 </mn> <mi>s </mi> </mrow> <mrow> <mi>p </mi> <mo>+ </mo> <mn>1 </mn> </mrow> </mfrac> <mo>,</mo> <mn>2 </mn> <mi>s </mi> </mrow> <mo>) </mo> </mrow> </math> -diagnosable,where 1≤s≤p.The result shows that the(t,k)-diagnosability of EH(s,p) is <math xmlns="http://www.w3.org/1998/Math/MathML"> <msup> <mn>2 </mn> <mrow> <mfrac> <mrow> <mi>s </mi> <mo>+ </mo> <mi>p </mi> <mo>− </mo> <mn>1 </mn> </mrow> <mn>2 </mn> </mfrac> </mrow> </msup> </math> ,which is bigger than its ordinary diagnosability s+1,and the conditional (t,k)-diagnosability is <math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow> <mfrac> <mrow> <msup> <mn>2 </mn> <mrow> <mi>s </mi> <mo>+ </mo> <mi>p </mi> <mo>+ </mo> <mn>1 </mn> </mrow> </msup> <mo>− </mo> <mn>2 </mn> <mi>s </mi> </mrow> <mrow> <mi>p </mi> <mo>+ </mo> <mn>1 </mn> </mrow> </mfrac> </mrow> </math>,which is bigger than its ordinary conditional diagnosability 4s-3.Above results present the important theory basis for fault diagnosis of exchanged hypercube network.…”
Get full text
Article -
9529
-
9530
A Massively Parallel SMC Sampler for Decision Trees
Published 2025-01-01“…A widely used approach to reducing an algorithm’s runtime is to employ modern multi-core computer architectures, either with shared memory (SM) or distributed memory (DM), and use parallel computing to accelerate the algorithm. …”
Get full text
Article -
9531
Balanced Performance Merit on Wind and Solar Energy Contact With Clean Environment Enrichment
Published 2024-01-01Get full text
Article -
9532
Accelerated development of multi-component alloys in discrete design space using Bayesian multi-objective optimisation
Published 2025-01-01“…This approach is particularly advantageous for deployment in massively parallel high-throughput synthesis facilities and advanced computing architectures.…”
Get full text
Article -
9533
Three-Dimensional Inversion of Borehole-Surface Resistivity Method Based on the Unstructured Finite Element
Published 2021-01-01“…The quasi-Newton method with limited memory (L_BFGS) is used to optimize the objective function in the inversion calculation, and a double-loop recursive method is used to solve the normal equation obtained at each iteration in order to avoid computing and storing the sensitivity matrix explicitly and reduce the amount of calculation. …”
Get full text
Article -
9534
Wearable Regionally Trained AI-Enabled Bruxism-Detection System
Published 2025-01-01Get full text
Article -
9535
-
9536
An Intelligent Big Data Security Framework Based on AEFS-KENN Algorithms for the Detection of Cyber-Attacks from Smart Grid Systems
Published 2024-06-01“…The main obstacles in turning the heterogeneous large dataset into useful results are computational burden and information security. The original contribution of this paper is to develop a new big data framework for detecting various intrusions from the smart grid systems with the use of AI mechanisms. …”
Get full text
Article -
9537
Implementation of an information system for tuberculosis in healthcare facilities in Indonesia: evaluation of its effectiveness and challenges
Published 2025-01-01“…SITB utilization is comprehensively assessed using the End-User Computing Satisfaction (EUCS) method, which considers the dimensions of content, accuracy, timeliness, and ease of use. …”
Get full text
Article -
9538
-
9539
ASSESSING THE RESULTS OF TRAINING IN DIGITAL ENTREPRENEURSHIP IN THE AGE OF HIGH AND DEEP TECH
Published 2024-02-01“…The article proposes a method of assessing the level of competences of students of economic specialties in the field of learning digital entrepreneurship based on soft computing, and also formulates the key basic competencies that arise during the online course of digital entrepreneurship, which are based on the latest development trends in the field of IT. …”
Get full text
Article -
9540