Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
9921
Ion suppression correction and normalization for non-targeted metabolomics
Published 2025-02-01Get full text
Article -
9922
A Methodology of Real-Time Data Fusion for Localized Big Data Analytics
Published 2018-01-01“…It is highly valuable to have computational values available locally instead of through distributed resources to reduce real-time analytical challenges. …”
Get full text
Article -
9923
On the Shoulders of Giants: Incremental Influence Maximization in Evolving Social Networks
Published 2017-01-01Get full text
Article -
9924
Classification of Error-Diffused Halftone Images Based on Spectral Regression Kernel Discriminant Analysis
Published 2016-01-01Get full text
Article -
9925
Effectof Unit Hydrographs and Rainfall Hyetographs on Critical Rainfall Estimates of Flash Flood
Published 2020-01-01“…The computed TR-Pa curves reveal that, for given Pa and UH, the TR corresponding to linearly increasing hyetograph is the minimum one. …”
Get full text
Article -
9926
Accident Management in VVER-1000
Published 2008-01-01“…The mentioned study involved both experimental and computational fields. The purpose of this paper is to summarize the main findings from the execution of a wide-range analysis focused on AM in VVER-1000 with main regard to the qualification of computational tools and the proposal for an optimal AM strategy for this kind of NPP.…”
Get full text
Article -
9927
TRANSFORMATION OF MARKETING TECHNOLOGIES IN MACHINE INTELLIGENCE ERA
Published 2018-01-01“…First of all, this is the result of popularity of digital devices and rapid growth of computational power of computers. It allows to digitalize consumers’ofline behavior and to analyze data using machine learning methods in order to enhance the relevance of particular marketing programs for each individual customer segment. …”
Get full text
Article -
9928
A Concept for Striking Range Improvement of the GROM/PIORUN Man-Portable Air-Defence System
Published 2017-03-01“…A mathematical and physical model of the GROM rocket missile was designed and its enhanced propulsion system was simulated in a computer environment. The computer simulation results were displayed on plot charts.…”
Get full text
Article -
9929
Indistinguishability in controlled query evaluation over prioritized description logic ontologies
Published 2025-01-01“…We investigate both semantic and computational properties of CQE in the context of OWL ontologies, and specifically in the description logic DL-LiteR, which underpins the OWL 2 QL profile. …”
Get full text
Article -
9930
Model-Based Variation-Aware Optimization for Offset Calibration and Pre-Sensing in DRAM Sense Amplifiers
Published 2025-01-01Get full text
Article -
9931
-
9932
An Active Learning Approach with Uncertainty, Representativeness, and Diversity
Published 2014-01-01Get full text
Article -
9933
Predictive modeling of ALS progression: an XGBoost approach using clinical features
Published 2024-12-01Get full text
Article -
9934
-
9935
A New Quantitative Definition of the Complexity of Organized Matters
Published 2022-01-01“…The major issue of these definitions is that they captured only a single feature among the three key features of complexity, descriptive, computational, and distributional features, for example, the effective complexity captured only the descriptive feature, the logical depth captured only the computational, and the statistical complexity captured only the distributional. …”
Get full text
Article -
9936
The Experience of Target Training for the Defense Industry
Published 2018-12-01“…Along with traditional engineering knowledge and skills, this training should provide the development of students’ competencies in the field of computer technology for design automation, production preparation. …”
Get full text
Article -
9937
Application of the New Mapping Method to Complex Three Coupled Maccari’s System Possessing M-Fractional Derivative
Published 2024-07-01“…Our study establishes a connection between computer science and soliton physics, emphasizing the pivotal role of soliton phenomena in advancing simulations and computational modeling. …”
Get full text
Article -
9938
Kecemasan mahasiswa teknik komputer dan jaringan dalam menghadapi ujian praktik kejuruan
Published 2020-08-01“…The results of the study reveal that the first, the level of anxiety of students majoring in Computer and Network Engineering in facing vocational practice exams is generally in the low category. …”
Get full text
Article -
9939
Convolutional neural network model over encrypted data based on functional encryption
Published 2024-03-01“…Currently, homomorphic encryption, secure multi-party computation, and other encryption schemes are used to protect the privacy of sensitive data in outsourced convolutional neural network (CNN) models.However, the computational and communication overhead caused by the above schemes would reduce system efficiency.Based on the low cost of functional encryption, a new convolutional neural network model over encrypted data was constructed using functional encryption.Firstly, two algorithms based on functional encryption were designed, including inner product functional encryption and basic operation functional encryption algorithms to implement basic operations such as inner product, multiplication, and subtraction over encrypted data, reducing computational and communication costs.Secondly, a secure convolutional computation protocol and a secure loss optimization protocol were designed for each of these basic operations, which achieved ciphertext forward propagation in the convolutional layer and ciphertext backward propagation in the output layer.Finally, a secure training and classification method for the model was provided by the above secure protocols in a module-composable way, which could simultaneously protect the confidentiality of user data as well as data labels.Theoretical analysis and experimental results indicate that the proposed model can achieve CNN training and classification over encrypted data while ensuring accuracy and security.…”
Get full text
Article -
9940
Sound-Induced Round Window Vibration—Experiment and Numerical Simulations of Energy Transfer Through the Cochlea of the Human Ear
Published 2024-12-01“…The numerical computations of acoustic signal amplification showed good agreement with the experimental data, particularly at the frequencies of 1 and 2 kHz. …”
Get full text
Article