Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
10401
Numerical Algorithm Based on Haar-Sinc Collocation Method for Solving the Hyperbolic PDEs
Published 2014-01-01“…The advantages of this technique are that not only is the convergence rate of Sinc approximation exponential but the computational speed also is high due to the use of the Haar operational matrices. …”
Get full text
Article -
10402
-
10403
Assessment of Surface Runoff for Tank Watershed in Tamil Nadu Using Hydrologic Modeling
Published 2018-01-01“…The study reveals that it is feasible to harvest and manage water effectively if its availability and demand are computed accurately.…”
Get full text
Article -
10404
Spectroscopic, DFT, anti-bacterial, and in-silico investigations of novel semicarbazone and thiosemicarbazone synthesised from asymmetrical chalcones
Published 2025-04-01“…Also, density functional theory (DFT) was used to compute quantum computations such as HOMO, LUMO, and chemical descriptors. …”
Get full text
Article -
10405
Randomized radial basis function neural network for solving multiscale elliptic equations
Published 2025-01-01“…The RRNN method commences by decomposing the computational domain into non-overlapping subdomains. …”
Get full text
Article -
10406
Dependability and Security for Wireless Ad Hoc and Sensor Networks and Their Applications
Published 2013-07-01Get full text
Article -
10407
-
10408
Self-similar random fractal measures using contraction method in probabilistic metric spaces
Published 2003-01-01Get full text
Article -
10409
Protecting cell cycle integrity: enhanced start-codon stringency in mitosis
Published 2025-02-01Get full text
Article -
10410
Code Parameter Summarization Based on Transformer and Fusion Strategy
Published 2024-01-01Get full text
Article -
10411
-
10412
A Variable Precision Attribute Reduction Approach in Multilabel Decision Tables
Published 2014-01-01Get full text
Article -
10413
AFT-SAM: Adaptive Fusion Transformer with a Sparse Attention Mechanism for Audio–Visual Speech Recognition
Published 2024-12-01Get full text
Article -
10414
3G Long Term Evolution Baseband Processing with Application-Specific Processors
Published 2009-01-01“…As a result, the design space that describes the essential computational challenges of 3G LTE receivers is clarified and estimates of area, power, and interprocessor communication buffer requirements are presented.…”
Get full text
Article -
10415
-
10416
Intelligent CO2 Monitoring for Diagnosis of Sleep Apnea Using Neural Cryptography Techniques
Published 2022-01-01Get full text
Article -
10417
Maximizing Optical Chirality Through Tailored Excitation Fields: A T-Matrix Approach
Published 2025-01-01Get full text
Article -
10418
Improved Algorithm for Gradient Vector Flow Based Active Contour Model Using Global and Local Information
Published 2013-01-01“…Experimental results illustrate the efficiency of our method, and the computational complexity is also analyzed.…”
Get full text
Article -
10419
Graph Convolutional Network for Word Sense Disambiguation
Published 2021-01-01“…Word2Vec tool, Doc2Vec tool, pointwise mutual information (PMI), and TF-IDF are applied to compute embeddings of nodes and edge weights. GCN is used to fuse features of a node and its neighbors, and the softmax function is applied to determine the semantic category of the ambiguous word. …”
Get full text
Article -
10420
Identification of Weakly Pitch-Shifted Voice Based on Convolutional Neural Network
Published 2020-01-01“…Specifically, linear frequency cepstral coefficients (LFCC) computed from power spectrums are considered and their dynamic coefficients are extracted as the discriminative features. …”
Get full text
Article