Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
10681
Lightweight privacy preservation blockchain framework for healthcare applications using GM-SSO
Published 2025-03-01“…Hence, a lightweight privacy preservation mechanism based on blockchain and consensus is developed with minimal computational overhead. Initially, the reputation score is computed for every registered node using the confidence threshold value and transaction to verify the trustworthiness of the IoMT nodes. …”
Get full text
Article -
10682
Modeling of Small DC Magnetic Field Response in Trilayer Magnetoelectric Laminate Composites
Published 2012-01-01“…For approaching the real materials’ properties, a measured magnetization curve of the Ni plate is used in the computations. The reported results take into account the finite-size effects of the structure, such as the fringing electric field effect and the demagnetization, as well as the effect of the finite conductivity of the Ni layers on the output voltage. …”
Get full text
Article -
10683
Touch-driven advantages in reaction time but not in performance in a cross-sensory comparison of reinforcement learning
Published 2025-01-01“…This online study investigated learning behaviour across visual, auditory, and haptic modalities using a probabilistic selection task on computers and mobile devices, employing dynamic and ecologically valid stimuli to enhance generalisability. …”
Get full text
Article -
10684
Accessible AI Diagnostics and Lightweight Brain Tumor Detection on Medical Edge Devices
Published 2025-01-01“…The model reduces computational overhead while maintaining high detection accuracy by replacing the computationally intensive ResNet backbone with MobileNet and leveraging depthwise separable convolutions. …”
Get full text
Article -
10685
-
10686
STICI: Split-Transformer with integrated convolutions for genotype imputation
Published 2025-01-01Get full text
Article -
10687
Election Prediction on Twitter: A Systematic Mapping Study
Published 2021-01-01Get full text
Article -
10688
Characterizing cell-type spatial relationships across length scales in spatially resolved omics data
Published 2025-01-01Get full text
Article -
10689
A Novel Spatio–Temporal Deep Learning Vehicle Turns Detection Scheme Using GPS-Only Data
Published 2023-01-01“…Whether the computer is driving your car or you are, advanced driver assistance systems (ADAS) come into play on all levels, from weather monitoring to safety. …”
Get full text
Article -
10690
Introduction of Gear Data Exchange Format Standard of German
Published 2018-01-01“…The unified management of gear information by computer and can be quickly and accurately and stably exchanged in computer or network system is realized by GDE. …”
Get full text
Article -
10691
Aggregation algorithm for MPLS multicast flows based on bidirectional shared tree
Published 2010-01-01“…The aggregated degrees of multicast flows were computed according to the relation among nodes. The label edge routers were clustered into the sets of leaf nodes on shared trees,and tree manager server computed the topology of bidirectional shared trees. …”
Get full text
Article -
10692
Approximate Method to Evaluate Reliability of Complex Networks
Published 2018-01-01“…This approximate method provides a very good accuracy and greatly reduces the computation for complex networks.…”
Get full text
Article -
10693
Order reduction for an RNA virus evolution model
Published 2015-05-01“…A mathematical or computational model in evolutionary biologyshould necessary combine several comparatively fast processes,which actually drive natural selection and evolution, with a veryslow process of evolution. …”
Get full text
Article -
10694
New method for adaptive echo cancellation in communication systems
Published 2007-01-01“…The advent of packetized audio transmission system has resulted in challenging requirements for echo cancellation technology.One key aspect of this technology is the need to estimate,quickly and accurately,the delay in an echo path in the transmission media.Delay estimation based on direct application of cross-correlation has poor performance and high implementation cost for the echo cancellation.A new method was presented in this paper.Input signals are bandpass filtered,downsampled,and cross-correlation function is computed via using the whitened signals.Theoretical analysis and experiment results show that the new delay estimation has resulted in higher performance and lesser computation cost than the traditional delay estimation.This method has a broad application in communication systems.…”
Get full text
Article -
10695
The Tangibilization of Indigenous Dances and the Rehearsal of a Similarity Model for Quantitative Analysis of Movement
Published 2024-06-01“…This article explores several tools of varied affordability within the field of computer-based technologies of human movement recognition as a means of responding to the current lack of protection extended to Indigenous dances. …”
Get full text
Article -
10696
PROFESSOR WORK AT UNIVERSITY: DAILY PROBLEMS AND SOLUTIONS
Published 2016-12-01“…The educational programs should be designed according to the employers' requirements, particularly in such areas as computer engineering and programming. An example of an application of new methods in teaching the discipline «Computer and peripherals» is presented.…”
Get full text
Article -
10697
Determination of Stress Intensity Factors and J integral based on Digital Image Correlation
Published 2019-07-01“…Against this background the paper summarizes a procedure to compute the J integral and the stress intensity factors KI and KII based on DIC data. …”
Get full text
Article -
10698
Detection of the onset of numerical chaotic instabilities by lyapunov exponents
Published 2001-01-01“…It is commonly found in the fixed-step numerical integration of nonlinear differential equations that the size of the integration step is opposite related to the numerical stability of the scheme and to the speed of computation. We present a procedure that establishes a criterion to select the largest possible step size before the onset of chaotic numerical instabilities, based upon the observation that computational chaos does not occur in a smooth, continuous way, but rather abruptly, as detected by examining the largest Lyapunov exponent as a function of the step size. …”
Get full text
Article -
10699
Torsion and anomalies in the warped limit of Lifschitz theories
Published 2020-01-01“…We show, both through the explicit computation of the path integral Jacobian and through the solution of the Wess-Zumino consistency conditions, that the translation symmetry in the anisotropic direction becomes anomalous. …”
Get full text
Article -
10700
Cooperative transmission design combining network coding and superposition coding
Published 2012-08-01“…A joint network coding (NC) and superposition coding scheme was proposed to realize a cooperative transmission.The use of NC was able to improve spectral efficiency over classical decode and forward relaying strategy by relaxing the orthogonality constraint between different data streams and mitigating the resultant interference through precoding.In contrast to using the CSI based beamforming scheme which could achieve near optimal performance but involves huge computational complexity,designing the beamforming vector using the form of superposition coding was proposed,such that CSI at the transmitters were not required and the involved computation was greatly reduced.The theoretical analysis and simulation results reveal that the proposed scheme shows performances close to the near-optimal CSIT based scheme.…”
Get full text
Article