Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
10721
Limiting Performance of Helmets for the Prevention of Head Injury
Published 1999-01-01“…Computational results are compared with the experimental results.…”
Get full text
Article -
10722
Electronic cash system based on certificateless group signature
Published 2016-05-01“…An efficient elliptic certificateless group signature ith forward security and member revocation based on ACJT group signature was proposed.Compared to ACJT which has complex computation,many parameters and long signature length,proposed scheme has less parameters and only involve a small amount of computation.The length of proposed signature is short and the efficiency is high.A fair off-line multi-bank e-cash system based on this group signa-ture scheme was also proposed.The new e-cash system has not only the high security and efficiency,but the unforgeabil-ity.It also can avoid double-spending and tampering money.The scheme has a clear advantage compared with others.…”
Get full text
Article -
10723
Determination of Stress Intensity Factors and J integral based on Digital Image Correlation
Published 2019-05-01“…Against this background the paper summarizes a procedure to compute the J integral and the stress intensity factors KI and KII based on DIC data. …”
Get full text
Article -
10724
Vehicle Detection for Vision-Based Intelligent Transportation Systems Using Convolutional Neural Network Algorithm
Published 2022-01-01“…Software based solutions using traditional algorithms such as Histogram of Gradients (HOG) and Gaussian Mixed Model (GMM) are computationally slow and not suitable for real-time traffic detection. …”
Get full text
Article -
10725
Image Super-Resolution Reconstruction Based on the Lightweight Hybrid Attention Network
Published 2024-01-01“…In order to solve the problem that the current image super-resolution model has too many parameters and high computational complexity, this paper proposes a lightweight hybrid attention network (LHAN). …”
Get full text
Article -
10726
Integrating Explainable Artificial Intelligence in Extended Reality Environments: A Systematic Survey
Published 2025-01-01Get full text
Article -
10727
An Efficient Approach to Mining Maximal Contiguous Frequent Patterns from Large DNA Sequence Databases
Published 2012-03-01“…Mining interesting patterns from DNA sequences is one of the most challenging tasks in bioinformatics and computational biology. Maximal contiguous frequent patterns are preferable for expressing the function and structure of DNA sequences and hence can capture the common data characteristics among related sequences. …”
Get full text
Article -
10728
-
10729
Robustness of Dengue Complex Network under Targeted versus Random Attack
Published 2017-01-01Get full text
Article -
10730
A Fatigue Life Prediction Method for the Drive System of Wind Turbine Using Internet of Things
Published 2020-01-01Get full text
Article -
10731
Enhancing Essay Scoring: An Analytical and Holistic Approach With Few-Shot Transformer-Based Models
Published 2025-01-01Get full text
Article -
10732
Forest Fire Prevention, Detection, and Fighting Based on Fuzzy Logic and Wireless Sensor Networks
Published 2018-01-01Get full text
Article -
10733
Cyber Security Intrusion Detection Using a Deep Learning Method
Published 2025-01-01“…This detection method may prove to be very useful for ensuring cyber security of computers hence preventing data and economic loss.…”
Get full text
Article -
10734
MAGAN: Unsupervised Low-Light Image Enhancement Guided by Mixed-Attention
Published 2022-06-01Get full text
Article -
10735
Topic Detection and Tracking Techniques on Twitter: A Systematic Review
Published 2021-01-01Get full text
Article -
10736
CC2: Defending Hybrid Worm on Mobile Networks with Two-Dimensional Circulation Control
Published 2019-01-01Get full text
Article -
10737
A travelable area boundary dataset for visual navigation of field robots
Published 2025-01-01Get full text
Article -
10738
Multiagent Reinforcement Learning-Based Taxi Predispatching Model to Balance Taxi Supply and Demand
Published 2020-01-01“…Besides, in order to reduce computational complexity, we propose several methods to reduce the state space and action space of reinforcement learning. …”
Get full text
Article -
10739
Impact of facial tattoos and paintings on face recognition systems
Published 2021-11-01Get full text
Article -
10740