Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
9821
Uncertainties in Earthquake Risk Assessment for Disaster Planning
Published 2015-08-01“…Uncertainties of the seismic risk assessment parameters can be generated from ground motion computations, structural inventories and risk methodologies. …”
Get full text
Article -
9822
Besov-Schatten Spaces
Published 2012-01-01“…Finally we compute the space of all Schur multipliers on 𝐵1(ℓ2).…”
Get full text
Article -
9823
-
9824
-
9825
-
9826
Vehicle speed measurement method using monocular cameras
Published 2025-01-01“…By leveraging the characteristics of the speed measurement problem, the complex three-dimensional positioning problem is simplified into a two-dimensional model, reducing the overall computational complexity of the positioning problem. …”
Get full text
Article -
9827
On QSPR analysis of pulmonary cancer drugs using python-driven topological modeling
Published 2025-02-01“…Degree-based topological indices were computed using computational methods driven by Python that are mathematical representations of properties of molecules without physical measurement. …”
Get full text
Article -
9828
Research on certificateless anonymous authentication and key agreement scheme of vehicle network based on CPN
Published 2024-06-01“…To address the shortcomings of existing authentication schemes in vehicle networks, which commonly suffer from key escrow issues, as well as the lack of consideration for lightweight deployment and secure rapid authentication of compute-constrained electronic control unit (ECU), a lightweight certificateless anonymous authentication and key agreement scheme without bilinear pairings was proposed for compute-unconstrained ECU networks. …”
Get full text
Article -
9829
EMIKNet: Expanding Multiple-Instance Inverse Kinematics Network for Multiple End-Effector and Multiple Solutions
Published 2025-01-01“…We also verify multiple solutions obtained through hierarchical computation of GMM.…”
Get full text
Article -
9830
Sensitivity analysis for any functions of static elastic systems using combination of adjoint variable method and automatic differentiation for topology optimization
Published 2024-12-01“…This study proposes a methodology to generalize and reduce the computational cost of sensitivity analysis for static linear elastic systems in topology optimization. …”
Get full text
Article -
9831
Image Processing-Based Spall Object Detection Using Gabor Filter, Texture Analysis, and Adaptive Moment Estimation (Adam) Optimized Logistic Regression Models
Published 2020-01-01“…This study aims at proposing a computer vision model for automatic recognition of localized spall objects appearing on surfaces of reinforced concrete elements. …”
Get full text
Article -
9832
Concrete Image Segmentation Based on Multiscale Mathematic Morphology Operators and Otsu Method
Published 2015-01-01“…The aim of the current study lies in the development of a reformative technique of image segmentation for Computed Tomography (CT) concrete images with the strength grades of C30 and C40. …”
Get full text
Article -
9833
Numerical Simulation of the Vibration Behavior of Curved Carbon Nanotubes
Published 2014-01-01“…Both computational and analytical results were compared. It was shown that the computational results are in good agreement with the analytical calculations in the case of straight tubes. …”
Get full text
Article -
9834
CATPE protocol with capture effect for RFID tag anti-collision
Published 2014-07-01“…The advantage of the protocol is that it does not need search an extreme, but one-step estimates the parameters.Thus it may reduce the computational complexity.Computer simulation results show that the identification efficiency of proposed protocol is almost identical to the existing ones, but has lower computational complexity.…”
Get full text
Article -
9835
Efficient Mining of Interesting Patterns in Large Biological Sequences
Published 2012-03-01“…Experimental results show that our approach can find interesting patterns within an acceptable computation time.…”
Get full text
Article -
9836
Abnormal data filtering approach based on collective trust for WSN
Published 2014-05-01“…Simulation results show that this method cannot only detect and filter the outliner in-time,but also need low cost in transmission and computation.…”
Get full text
Article -
9837
A Simplified Milstein Scheme for SPDEs with Multiplicative Noise
Published 2014-01-01“…The convergence analysis for this scheme is carried out and it is shown that even with this replacement the order of convergence is maintained, while the resulting scheme is easier to implement and slightly more efficient computationally. Some numerical tests are given that confirm the order of accuracy and also computational cost reduction.…”
Get full text
Article -
9838
Investigation of a spatial double pendulum: an engineering approach
Published 2006-01-01“…., mathematical model) were derived for this SDP, and oscillations of the system were computed and compared with experimental results. Matlab computer programs were used for solving the nonlinear differential equations by the Runge-Kutta method. …”
Get full text
Article -
9839
Multimodal Deep Learning for Differentiating Bacterial and Fungal Keratitis Using Prospective Representative Data
Published 2025-03-01“…The multimodal model did not substantially improve performance compared with the computer vision model. Conclusions: The best-performing machine learning classifier for infectious keratitis was a computer vision model trained using the MADURAI dataset. …”
Get full text
Article -
9840
A New Algorithm for System of Integral Equations
Published 2014-01-01“…To verify the efficiency, the results of computational experiments are given.…”
Get full text
Article