Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
10001
Contrast Expansion Method for Elastic Incompressible Fibrous Composites
Published 2017-01-01“…Contrast parameter expansion of the elastic fields for 2D composites is developed by Schwarz’s method and by the method of functional equations for the case of circular inclusions. A computationally efficient algorithm is described and implemented in symbolic form to compute the local fields in 2D elastic composites and the effective shear modulus for macroscopically isotropic composites. …”
Get full text
Article -
10002
Numerical Solution of Fractional Order Anomalous Subdiffusion Problems Using Radial Kernels and Transform
Published 2021-01-01“…The computation can be done in parallel and no time sensitivity is involved in approximating the time fractional operator as contrary to finite differences. …”
Get full text
Article -
10003
Efficient identification protocol provably secure in standard model
Published 2009-01-01“…Due to its simplicity and naturalness, low-memory, low-computation costs, and better security, the proposed scheme is well suitable for using in computationally limited devices for identification such as smart cards.…”
Get full text
Article -
10004
Prediction Score for Cervical Spine Fracture in Patients with Traumatic Neck Injury
Published 2021-01-01“…Diagnostic imaging in developing countries has several limitations. A computed tomography scan is not available 24 hours and not cost-effective. …”
Get full text
Article -
10005
Deep Drug–Target Binding Affinity Prediction Base on Multiple Feature Extraction and Fusion
Published 2025-01-01Get full text
Article -
10006
Corrigendum to “Efficient BFCN for Automatic Retinal Vessel Segmentation”
Published 2020-01-01Get full text
Article -
10007
Retracted: Public Alerts on Landslide Natural Disaster Using Vehicular Communications
Published 2014-06-01Get full text
Article -
10008
An efficient PG-INLA algorithm for the Bayesian inference of logistic item response models
Published 2025-01-01“…The proposed PG-INLA algorithm utilizes a computationally efficient data augmentation strategy via the Pólya-Gamma variables, which can avoid low computational efficiency of traditioanl Bayesian MCMC algorithms for IRT models with a logistic link function. …”
Get full text
Article -
10009
Efficient and privacy-preserving online face authentication scheme
Published 2020-05-01“…In traditional face authentication system,the trait template and authentication request were generally matched over plaintext,which may lead to the leakage of users’ sensitive data.In order to address the above-mentioned problem,based on matrix encryption,an efficient and privacy-preserving online face authentication scheme was proposed.Specifically,the users’ face trait template for register and the authentication request were encrypted before being sent to the online authentication server,and the similarity computation between the encrypted face trait template and authentication request was computed by the online authentication server over ciphertexts,which guaranteed the security of users’ sensitive data without affecting the accuracy of face authentication.Security analysis shows that the proposed scheme can achieve multiple security levels according to different security parameters.Moreover,performance evaluation shows that the proposed scheme has low computation cost and communication overhead.Experiments results demonstrate the high efficiency of the proposed scheme,which can be implemented in the real environment effectively.…”
Get full text
Article -
10010
Modeling and Simulation of Wake Safety Interval for Paired Approach Based on CFD
Published 2021-01-01“…This method realized visual analysis of wake vortex through optimization modeling based on computational fluid dynamics, contributing to increasing the capacity of the runway and improving the operation efficiency of an aerodrome.…”
Get full text
Article -
10011
Lightweight certificateless linearly homomorphic network coding signature scheme for electronic health system
Published 2021-01-01“…This scheme requires a quite low computational cost when both signing and verifying a data packet. …”
Get full text
Article -
10012
PEM-PCA: A Parallel Expectation-Maximization PCA Face Recognition Architecture
Published 2014-01-01“…However, the covariance matrix and eigenvalue decomposition stages cause high computational complexity, especially for a large database. …”
Get full text
Article -
10013
Pulmonary embolism. A case report
Published 2010-12-01“…The posterior to anterior chest X-ray showed opacities in the form of a veil at the base of the left hemithorax as well as increased cardiothoracic rates. A lung computed tomography angiography scan was performed using a SIEMENS SESATION 64 multislice computed tomography scanner. …”
Get full text
Article -
10014
Efficient and provably secure attribute-based online/offline encryption schemes
Published 2014-07-01“…The ABOOE non-trivially splited the encryption process into two phases: the offline phase first executed most of heavy computations prior to knowing the message and the attributes' set; and then the online phase only performed light computations to produce the ciphertext once the attrib-utes' set and the message get available. …”
Get full text
Article -
10015
A study over the Formulation of the Parameters 5 or Less Independent Variables of Multiple Linear Regression
Published 2019-01-01“…In addition to classical matrix form, these new formulas for estimation of the parameters of multiple linear regression could be proposed especially to the researchers not using computer program for calculating the complex operations. …”
Get full text
Article -
10016
Design of Anomaly Based Intrusion Detection System Using Support Vector Machine and Grasshopper Optimization Algorithm in IoT
Published 2024-02-01“…Computer networks play an important and practical role in communication and data exchange, and they also share resources with complete ease. …”
Get full text
Article -
10017
An Asymmetrical Mixed Higher-Order Discontinuous Galerkin Time Domain Method for Electromagnetic Scattering from the Plasma Sheath around a Hypersonic Vehicle
Published 2023-01-01“…The physical properties of the nonuniform plasma flow were obtained using computational fluid dynamics software with unstructured grids. …”
Get full text
Article -
10018
Random 2D Composites and the Generalized Method of Schwarz
Published 2015-01-01“…This method is related to the traditional method based on the average probabilistic values involving the n-point correlation functions. However, we avoid computation of the correlation functions and compute their weighted moments of high orders by an indirect method which does not address the correlation functions. …”
Get full text
Article -
10019
Three-Dimensional Human Modeling Applications in Sport Sciences
Published 2018-08-01“…Virtual objects, which are transferred to virtual environments by a designer or a design team using various software, has been used many important areas such as health, security, education and sports which are using computer technology. There are a lot of computer software for three-dimensional modeling with license-paid, shareware and freeware. …”
Get full text
Article -
10020
Using nonlinear model predictive control to find optimal therapeutic strategies to modulate inflammation
Published 2010-09-01“…Modulation of the inflammatory response has become a key focal point in the treatment of critically ill patients. Much of the computational work in this emerging field has been carried out with the goal of unraveling the primary drivers, interconnections, and dynamics of systemic inflammation. …”
Get full text
Article