Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
10781
Incidental Findings of Asymptomatic Fungal Infection
Published 2022-01-01“…Computed tomography (CT) scan of the maxillofacial region, specifically paranasal sinuses, plays a considerable role in diagnosing fungal sinusitis. …”
Get full text
Article -
10782
Model Updating Method Based on Kriging Model for Structural Dynamics
Published 2019-01-01“…Model updating in structural dynamics has attracted much attention in recent decades. And high computational cost is frequently encountered during model updating. …”
Get full text
Article -
10783
Finite element analysis and artificial neural network for stress distribution of an aircraft model in a wind tunnel
Published 2025-01-01“…In addition, the methodology is significant in computations since the ANN works quicker than conventional FEA. …”
Get full text
Article -
10784
Machine Learning Model for Gas–Liquid Interface Reconstruction in CFD Numerical Simulations
Published 2025-01-01“…., normal, location, and curvature). Accurate computation of the local interface curvature is essential for evaluation of the surface tension force at the interface. …”
Get full text
Article -
10785
Limits and Risks of Digital Transformation
Published 2020-07-01“…In a number of problems associated with a computational experiment this can be quite significant.Great risks arise when passing to the "fast world", approaching the "Lem's barrier". …”
Get full text
Article -
10786
A chaotic digital signature algorithm based on a dynamic substitution box
Published 2025-01-01“…A key challenge is minimizing computationally intensive operations, such as modular inverses, without compromising security. …”
Get full text
Article -
10787
Deep Learning in Music Generation: A Comprehensive Investigation of Models, Challenges and Future Directions
Published 2025-01-01“…However, each model faces its own set of limitations, such as computational inefficiency, data dependency, and challenges in capturing complex emotional nuances. …”
Get full text
Article -
10788
Scalable circuit depth reduction in feedback-based quantum optimization with a quadratic approximation
Published 2025-01-01“…Combinatorial optimization problems are one of the areas where near-term noisy quantum computers may have practical advantage against classical computers. …”
Get full text
Article -
10789
Emergency Trajectory Structure for UAVs
Published 2024-12-01“…The primary aim of these tests is to benchmark the computational time of the overall architecture, ensuring that this adaptable framework is fully capable of handling the problem’s complexity. …”
Get full text
Article -
10790
SSCANL decoder based joint iterative detection and decoding algorithm
Published 2022-10-01“…In order to improve the receiver performance of the sparse code multiple access (SCMA) system based on polar codes, the cyclic redundancy check (CRC) aided joint iterative detection and decoding receiver scheme based on simplify soft cancellation list (SSCANL) decoder (C-JIDD-SSCANL) was proposed.A polar code decoder in the C-JIDD-SSCANL receiver used the SSCANL algorithm.In this algorithm, decoding node deletion technology was used to simplify L times of soft cancellation (SCAN) decoding required by soft cancellation list (SCANL) algorithm by deleting frozen bit nodes, then the computational process of soft information update between nodes was simplified, and the computational complexity of decoding algorithm was reduced.The simulation results show that the SSCANL algorithm can obtain the same performance as the SCANL algorithm, and its computational complexity is reduced compared with the SCANL algorithm.Compared with the joint iterative detection and decoding scheme based on SCAN decoder (JIDD-SCAN) and the CRC aided joint iterative detection and decoding scheme based on SCAN decoder (C-JIDD-SCAN), the performance of C-JIDD-SSCANL receiver scheme based on SSCANL decoder is improved by about 0.65 dB and 0.59 dB respectively when the bit error rate is 10<sup>-4</sup>.…”
Get full text
Article -
10791
Theoretical Study of the Structural and Electronic Properties of NIPAM Polymer Dosimetry Gel
Published 2024-12-01“…The computations of the structure, as well as the vibrational frequencies and chemical shift, demonstrated a satisfactory theoretical approximation. …”
Get full text
Article -
10792
Ways to improve the accuracy of the harmonic method for simulating two-dimensional signals
Published 2024-04-01“…The effect of the discovered properties on the computational complexity of the method is described. …”
Get full text
Article -
10793
High Performance GPU-Based Fourier Volume Rendering
Published 2015-01-01“…The introduction of the compute unified device architecture (CUDA) technology enables embarrassingly-parallel algorithms to run efficiently on CUDA-capable GPU architectures. …”
Get full text
Article -
10794
RELAP5 Calculations of Bethsy 9.1b Test
Published 2012-01-01“…Recently, several advanced computational tools for simulating reactor system behavior during real and hypothetical transient scenarios were developed. …”
Get full text
Article -
10795
XTNSR: Xception-based transformer network for single image super resolution
Published 2025-01-01“…However, challenges still need to be addressed in handling grid-like image patches with higher computational demands and addressing issues like over-smoothing in visual patches. …”
Get full text
Article -
10796
An Investigation Into a Lightweight Safety Helmet Detection Approach Utilizing the MSS-YOLO Framework
Published 2024-01-01“…Motivated by the challenges of low detection accuracy, false positives, false negatives, and the excessive computational demand in safety helmet detection within complex power scenarios, this paper introduces a lightweight safety helmet object detection algorithm based on MSS-YOLO. …”
Get full text
Article -
10797
Machine learning and Fuzzy logic fusion approach for osteoporosis risk prediction
Published 2025-06-01“…Machine learning implementation on these factors took a large computation time and has shown poor accuracy. Thus fuzzy concept has been introduced leading to the development of a fusion of machine learning and fuzzy logic approach. …”
Get full text
Article -
10798
Method on Efficient Operation of Multiple Models for Vision-Based In-Flight Risky Behavior Recognition in UAM Safety and Security
Published 2024-01-01“…Recently, with the significant spread of technology in the field of computer vision, research has been conducted to manage passenger safety and security with vision-based approaches. …”
Get full text
Article -
10799
Survey of optical-based physical domain adversarial attacks and defense
Published 2024-04-01“…This poses a huge security threat to computer vision systems that are based on deep learning. …”
Get full text
Article -
10800
Calculating torque, back-EMF, inductance, and unbalanced magnetic force for a hybrid electrical vehicle by in-wheel drive application
Published 2024-06-01“…Then, the self-inductance of the stator and rotor windings, the mutual inductance between the stator and rotor windings, and the mutual inductance between the stator phases are computed. Next, the components of the unbalanced magnetic force (UMF) in the direction of the x and y axes and its amplitude are computed. …”
Get full text
Article