Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
9761
Study on the Operating Performance of Gear System based on Size Effect
Published 2015-01-01“…With micro-plastic-mechanics theory and FEM( finite element method),the performance of a pair of micro gears mechanism is studied.The elastic-plastic finite element computation format based on the size effect is established and put into effect with UPFs( User-programmable features) in ANSYS.This computation format is verified through comparing the micro-indention experiment of the polycrystalline copper with the computation results with FEM.Considering the size effect of the micro asperity,the influence of the micro geometric features( burrs and roughness) in the manufacturing errors of gears on the performance of this mechanism is studied with substructure FEM with computation program.The basis is supported for the mechanical trace failure analysis of gear mechanism through the study and the computation efficiency and the accuracy of the simulation is improved.…”
Get full text
Article -
9762
Virtual Reality: Is It Real Or Not?
Published 1996-01-01“…The problem is that of user-friendliness of computer systems. Needless to say, the current generation of computers still involves a barrier between human and machine. …”
Get full text
Article -
9763
Research and Practice Analysis of Higher Vocational Colleges Facing the Experience and Dissemination of Regional Characteristic Tea Culture
Published 2022-01-01“…Therefore, the dissemination of tea culture information can be realized with the help of computer technology. From this perspective, this paper analyzes the development of computer technology in the background of big data, summarizes the necessity of using computer technology in the dissemination of tea culture information and, on this basis, considers the application strategy of computer technology in the dissemination of tea culture information from the perspective of big data, hoping to enter a more ideal pattern of tea culture information dissemination.…”
Get full text
Article -
9764
Pairing Optimizations for Isogeny-Based Cryptosystems
Published 2024-01-01“…However, in most isogeny-based protocols, the performance of pairing computations is unsatisfactory due to the high computational cost of the Miller function. …”
Get full text
Article -
9765
KÜTÜPHANELERDE BİLGİSAYAR KULLANIMININ GETİRDİĞİ SORUNLAR
Published 1986-03-01“…Recently in Turkey, there is a tendency toward using computer in library work without really considering its disadvantages or limitations. …”
Get full text
Article -
9766
Optimizing low complexity encoding method for systematic polar code
Published 2018-07-01“…In order to solve the delay caused by step-by-step calculation and the computational complexity caused by iterative “exclusive-or” computation during the encoding process,a dimensionality reduction strategy was proposed and defined.Based on this,system polarization code parallel coding algorithm for cracking strategy was proposed.Simulation and computational complexity analysis were carried out on AWGN channel.The results show that the coding gain of the above algorithm is slightly better than the traditional one or almost the same,but the computational complexity is up to 80.92%,which is more suitable for hardware implementation and engineering application.It is more suitable for hardware implementation and has a certain practical value.…”
Get full text
Article -
9767
Impeller Flow Field Laser Velocimeter Measurements
Published 1996-01-01“…Development of Computational Fluid Dynamics (CFD) computer codes for complex turbomachinery affords a complete three-dimensional (3-D) flow field description. …”
Get full text
Article -
9768
Biological arrow of time: emergence of tangled information hierarchies and self-modelling dynamics
Published 2025-01-01“…We study open-ended evolution by focusing on computational and information-processing dynamics underlying major evolutionary transitions. …”
Get full text
Article -
9769
Quantum machine learning with Adaptive Boson Sampling via post-selection
Published 2025-01-01“…In recent years, an intermediate approach has been pursued to demonstrate quantum computational advantage via non-universal computational models. …”
Get full text
Article -
9770
A Discrete Dipole Approximation Solver Based on the COCG-FFT Algorithm and Its Application to Microwave Breast Imaging
Published 2019-01-01“…We have also optimized the matrix-vector multiplication step by formulating the problem such that the nondiagonal portion of the matrix used to compute the dipole moments is block-Toeplitz. The computation costs for multiplying the block matrices times a vector can be dramatically accelerated by expanding each Toeplitz matrix to a circulant matrix for which the convolution theorem is applied for fast computation utilizing the fast Fourier transform (FFT). …”
Get full text
Article -
9771
Nonlinear error modified equalization algorithm in high-order modulation of satellite communication
Published 2017-01-01“…Aiming at the larger computation and the slower speed of nonlinear error compensation of traditional equalization algorithms,the fast nonlinear error equalization algorithm with amplitude and phase separation was constructed.It combined the feedback equalization to reduce the computational complexity respectively.In order to eliminate nonlinear interference and memory interference,the algorithm utilized the Volterra model to modify the error and it was adapted to update the feedback equalization parameters.The theoretical analysis and simulation compared proposed algorithm and existing conventional equalization algorithms from the bit error rate,convergence speed and computational complexity.The results show that the computational complexity is only equivalent to 14.1%~24.9% of other algorithms and proposed method can cancel the nonlinear interference quickly.…”
Get full text
Article -
9772
Investigation of one task of the potential theory
Published 2002-12-01“… Using computer algebra package Maple we compute aproximative analytical solution. …”
Get full text
Article -
9773
Gaussian process latent variable models-ANN based method for automatic features selection and dimensionality reduction for control of EMG-driven systems
Published 2025-01-01“…Electromyography (EMG) signals have gained significant attention due to their potential applications in prosthetics, rehabilitation, and human-computer interfaces. However, the dimensionality of EMG signal features poses challenges in achieving accurate classification and reducing computational complexity. …”
Get full text
Article -
9774
Uniqueness of the Level Two Bayesian Network Representing a Probability Distribution
Published 2011-01-01“…It proposes a statement of the problem and the proposed method to compute probability distributions. It also uses D-separation for simplifying the computation of probabilities in Bayesian networks. …”
Get full text
Article -
9775
Design of Real-Time Hardware-in-the-Loop TV Guidance System Simulation Platform
Published 2017-01-01“…This paper presents a novel design of a real-time hardware-in-the-loop (HIL) missile TV guidance system simulation platform, which consists of a development computer, a target computer, a turntable, a control cabin, and a joystick. …”
Get full text
Article -
9776
Threshold ring signature for wireless sensor networks
Published 2012-03-01“…Compared with traditional network,the wireless sensor nodes are limited in the storage,mobility,computation,energy,and so on.A threshold ring signature scheme suitable for wireless sensor networks based on bilinear pairings was proposed.Assuming the abstrusity of computational Diffie-Hellman problem,the secure proof was shown in the model of random oracles using the reduction to the contravention.Proposed scheme also had other characteristics,such as robustness,multi-signature and parallel computation.…”
Get full text
Article -
9777
STEADY RESPONSES OF ROD UNDER ECCENTRIC AXIAL LOADING
Published 2020-01-01“…The pull rod under eccentric loading exists extensively in engineering project,the computations of its stress and strength directly affect its reliability,especially its dynamic stress computations. …”
Get full text
Article -
9778
Kodaira-Spencer anomalies with Stora-Zumino method
Published 2025-01-01“…This method, which allows to compute anomalies in a very concise way, makes manifest the topological origin of anomalies. …”
Get full text
Article -
9779
Abundant Interaction Solutions of Sine-Gordon Equation
Published 2012-01-01“…With the help of computer symbolic computation software (e.g., Maple), abundant interaction solutions of sine-Gordon equation are obtained by means of a constructed Wronskian form expansion method. …”
Get full text
Article -
9780
Vertex Degrees and Isomorphic Properties in Complement of an m-Polar Fuzzy Graph
Published 2017-01-01“…Computational intelligence and computer science rely on graph theory to solve combinatorial problems. …”
Get full text
Article