Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
10701
Pilot scheduling algorithm based on cell classification-cross entropy for massive MIMO
Published 2018-12-01“…Pilot scheduling problem belongs to the arrangement optimization problem, and the algorithm computational complexity of greedy algorithm to search the optimal solution is greatly. …”
Get full text
Article -
10702
Crack tip field in circumferentially-cracked round bar (CCRB) in tension affected by loss of axial symmetry
Published 2017-07-01“…In this paper, the stress intensity factor (SIF) is computed in a circumferentially-cracked round bar (CCRB) subjected to tensile loading, considering that the resistant ligament is circular and exhibits certain eccentricity in relation to the cylinder axis. …”
Get full text
Article -
10703
Interdental Papilla Length and the Perception of Aesthetics in Asymmetric Situations
Published 2015-01-01“…The purpose of the study was to determine if there was a difference in the perception of aesthetics, by dental specialty, using computer assisted asymmetric alteration of the papilla length in the aesthetic zone with an apical alteration of the contact point of the clinical crowns. …”
Get full text
Article -
10704
Limit Cycles and Analytic Centers for a Family of 4n-1 Degree Systems with Generalized Nilpotent Singularities
Published 2015-01-01“…With the aid of computer algebra system Mathematica 8.0 and by the integral factor method, for a family of generalized nilpotent systems, we first compute the first several quasi-Lyapunov constants, by vanishing them and rigorous proof, and then we get sufficient and necessary conditions under which the systems admit analytic centers at the origin. …”
Get full text
Article -
10705
Effect of Mesh on Springback in 3D Finite Element Analysis of Flexible Microrolling
Published 2015-01-01“…Two types of meshes with six mesh sizes for each mesh type are considered in this study and the optimal mesh type and mesh size have been found to obtain accurate value of springback while saving as much computational time as possible.…”
Get full text
Article -
10706
Cost-Sensitive Support Vector Machine Using Randomized Dual Coordinate Descent Method for Big Class-Imbalanced Data Classification
Published 2014-01-01“…The solution of concerned subproblem at each iteration is derived in closed form and the computational cost is decreased through the accelerating strategy and cheap computation. …”
Get full text
Article -
10707
Automatic Synthesis Algorithm of Topological Structure of Series Mechanism
Published 2018-01-01“…Then,the locations relationships among kinematic pairs are thoroughly enumerated by using the method of exhaustion,the automatically solving of position and orientation characteristics set is realized by using algorithm,the mechanism that meet the requirement is selected,and the GUI human-computer interaction interface is designed. The proposed automatic synthesis method is of universal significance,and the integrated mechanism is comprehensive that is convenient for the computer to analyze the automation of the mechanical system which make the automation be feasible.…”
Get full text
Article -
10708
Provably secure partially blind signature without trusted PKG
Published 2010-01-01“…Compared with the Chow et al.’s scheme, the new scheme needs less computational cost and is more efficient.…”
Get full text
Article -
10709
Non-uniform Fourier transform based image classification in single-particle Cryo-EM
Published 2025-06-01“…In contrast, the non-uniform Fourier transform provides more direct and accurate computation of rotation-invariant features without the need for interpolation in the computation process. …”
Get full text
Article -
10710
A Study on Internal Explosion Testing of the “Rigid-Flexible-Rigid” Three-Layer Sealed Structure
Published 2018-01-01“…The comparisons between the test results and the computed results obtained from the formulae were made, and the test results agreed well with the computed results. …”
Get full text
Article -
10711
An Extreme Learning Machine-Based Community Detection Algorithm in Complex Networks
Published 2018-01-01“…In this paper, by means of fusing unsupervised extreme learning machines and the k-means clustering techniques, we propose a novel community detection method that surpasses traditional k-means approaches in terms of precision and stability while adding very few extra computational costs. Furthermore, results of extensive experiments undertaken on computer-generated networks and real-world datasets illustrate acceptable performances of the introduced algorithm in comparison with other typical community detection algorithms.…”
Get full text
Article -
10712
Fast algorithm to search for the minimum number of active S-boxes of block cipher
Published 2023-01-01“…To solve the problem of fast calculation of the minimum number of active S-boxes in cryptographic design, the difference and mask propagation of the diffusion layer were investigated, and a method was proposed to compute the difference (resp.mask) pattern distribution table of MDS (maximum distance separable) matrices and binary matrices.A lower bound on the computation complexity of the proposed method was also given.Based on the difference (resp.mask) pattern distribution table of diffusion matrix, a fast algorithm to search for the minimum number of active S-boxes of block cipher was proposed.The proposed algorithm is applied to some SPN (substitution permutation network) block ciphers, and finds the minimum number of active S-boxes for the full round of LED, SKINNY, CRAFT and FIDES.…”
Get full text
Article -
10713
Is the Adjectival Suffix -al a Strong Suffix?
Published 2016-07-01“…We do find -al in strong endings triggering a direct computation of stress placement, but only in certain specific subclasses. …”
Get full text
Article -
10714
New Scheme of Finite Difference Heterogeneous Multiscale Method to Solve Saturated Flow in Porous Media
Published 2014-01-01“…Tests on a variety of numerical experiments show that, in the case that only about a half of the information of the whole microstructure is used, the constructed scheme gives better accuracy at a much lower computational time than FDHMM for the problem of aquifer response to sudden change in reservoir level and gives comparable accuracy at a much lower computational time than FDHMM for the weak drawdown problem.…”
Get full text
Article -
10715
Modification of Homotopy Perturbation method for addressing systems of PDEs
Published 2025-03-01“…By incorporating Laplace transforms and Padé approximants, MHPM achieves enhanced convergence and precision with minimal computational overhead, overcoming limitations of traditional perturbation techniques. …”
Get full text
Article -
10716
An efficient modified HS conjugate gradient algorithm in machine learning
Published 2024-11-01“…The Hestenes-Stiefe (HS) conjugate gradient method is very effective in resolving larger-scale sophisticated smoothing optimization tasks due to its low computational requirements and high computational efficiency. …”
Get full text
Article -
10717
Multiplicative Topological Properties on Degree Based for Fourth Type of Hex-Derived Networks
Published 2022-01-01“…Cheminformatics is a product field that combines chemistry, mathematics, and computer science. The graph plays a key role in modelling and coming up with any chemical arrangement. …”
Get full text
Article -
10718
Optimal approximation model of autocorrelation function of digital image
Published 2011-01-01“…Non-stationary stochastic signal was divided into piecewise stationary stochastic signal,and reflecting the sig-nal’s characteristics by autocorrelation function of the piecewise stationary stochastic signal.Generally,the autocorrela-tion function was the base of selecting signal base for signal representation.For expressing non-stationary stochastic sig-nal in a precise and effective way,based on the analysis of the natural characteristics of ARMA model and Markov proc-ess,a kind of multi-parameter estimation model of autocorrelation function for piecewise stationary stochastic process was proposed.The computational complexity was reduced,and the approximation effect was improved.Furthermore,the multi-parameter estimation model could also be adapted to the complex non-stationary stochastic signal,The computer simulation demonstrates that the approximation error was decreased significantly.…”
Get full text
Article -
10719
Laser Treatment for Strengthening of Thin Sheet Steel
Published 2020-01-01“…This paper presents the results of computer simulations and experimental studies, aiming to increase the mechanical strength of sheet metal parts manufactured from high-quality structural carbon steel by means of local laser processing. …”
Get full text
Article -
10720
Traumatic abdominal wall hernia with hemoperitoneum caused by blunt injury: laparoscopic exploration with mini-laparotomy repair. A case report
Published 2022-03-01“…Initially, an intra-abdominal hematoma was observed on computed tomography and no extravasation was noted. …”
Get full text
Article