Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
10881
Implementation Aspects in Simulation Extrapolation-Based Stocking–Lord Linking
Published 2025-01-01“…However, the original SIMEX approach can be computationally complex. This article evaluates two computational shortcuts to SIMEX-based SL linking through a simulation study: a quasi-Monte Carlo method that replicates items and a proposal using an approximate noniterative estimation instead of the iterative one in the SIMEX application of SL linking. …”
Get full text
Article -
10882
An Efficient Deterministic-Stochastic Model of the Human Body Exposed to ELF Electric Field
Published 2016-01-01“…The stochastic approach is based on the stochastic collocation (SC) method. Computational examples show the mean trend of both analytically and numerically computed axial current with the confidence margins for different set of input random variables. …”
Get full text
Article -
10883
A Vector Bond Graph Method of Dynamics Modeling for Planar Multi-body Systems with Grooved Sheave
Published 2017-01-01“…By using the corresponding algorithm,the computer automatic modeling and dynamics analysis of the planar multi-body system containing grooved sheave on a computer is realized,its validity is illustrated.…”
Get full text
Article -
10884
Secure contact tracing platform from simplest private set intersection cardinality
Published 2022-09-01“…SecureCT prevents linkage attacks, eliminates replay and relay attacks, and allows the phone's holder to delegate their contact tracing computation to untrusted servers while maintaining the user's privacy. …”
Get full text
Article -
10885
Secure Transmission Based on Antenna Selection for Network Coding System
Published 2015-02-01“…Specifically, the independent channel gain maximum(ICGM)scheme holds the similar performance compared with CMCCM scheme, while ICGM scheme can release the computation burden.…”
Get full text
Article -
10886
The Influence of User Protection Behaviors on the Control of Internet Worm Propagation
Published 2013-01-01“…Computer users’ reactions to the outbreak of Internet worm directly determine the defense capability of the computer and play an important role in the spread of worm. …”
Get full text
Article -
10887
Turbo iterative acquisition algorithm for satellite high-mobility DSSS signal
Published 2021-08-01“…To solve the problems of the low acquisition probability and high computational complexity in satellite high-mobility communications, a new factor graph was designed for acquisition of the high-mobility direct sequence spread spectrum (DSSS) signal, where time-varying Doppler rates were modeled by the random walk model.Based on the proposed factor graph, the turbo iterative DSSS signal acquisition algorithm was proposed.In the Doppler-estimation loop, the negative influence of Doppler frequency offsets and Doppler rates could be eliminated effectively.Then in the code-detection loop, constraints of each chip was used to recover the received signal, to achieve DSSS signal acquisition.Simulation results show that the proposed algorithm is capable of improving the acquisition performance at less 1.3 dB with low computational complexity.…”
Get full text
Article -
10888
On the sensitivity of feature ranked lists for large-scale biological data
Published 2013-03-01“…The problem of feature selection for large-scale genomic data, for example from DNA microarray experiments, is one of the fundamental and well-investigated problems in modern computational biology.From the computational point of view, a selected gene list should be characterized by good predictive power and should be understood and well explained from the biological point of view.Recently, another feature of selected gene lists is increasingly investigated, namely their stability which measures how the content and/or the gene order change when the data are perturbed.In this paper we propose a new approach to analysis of gene list stability, termed the sensitivity index, that does not require any data perturbationand allows the gene list that is most reliable in a biological sense to be chosen.…”
Get full text
Article -
10889
Numerical implementation of a multiaxial cyclic plasticity model for the Local Strain Method in low cycle fatigue
Published 2014-09-01“…Very often computations on structural elements or machine components subjected to variable loading require using an advanced finite element model. …”
Get full text
Article -
10890
A Novel Adaptive Probabilistic Nonlinear Denoising Approach for Enhancing PET Data Sinogram
Published 2013-01-01“…The edge-stopping function is computed in terms of edge probability under the assumption of contamination by Poisson noise. …”
Get full text
Article -
10891
Resonance Spectra of Caged Stringy Black Hole and Its Spectroscopy
Published 2015-01-01“…Instead of the ordinary QNMs, we compute the boxed QNMs (BQNMs) that are the characteristic resonance spectra of the confined scalar fields in the GHSBH geometry. …”
Get full text
Article -
10892
Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks
Published 2013-01-01“…Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'…”
Get full text
Article -
10893
Single-channel blind separation of co-frequency modulated signals based on Gibbs sampler
Published 2015-04-01“…A Gibbs-sampler-based separation algorithm was proposed for single-channel co-frequency digital-modulated signals,which were received in non-cooperative ways.The probability density samples of unknown symbol sequences can be obtained by statistic method,and the computation complexity was not growing exponentially with the increase of channel order.With special emphasis on the separation algorithms of single pair of symbols,multiple pair of symbols and the tracking of channel responses.Moreover,the separation performance between Gibbs sampler and per-survivor processing(PSP) algorithm were analyzed and compared in detail.Simulation results show that,compared with PSP algorithm with L=4 for two co-frequency QPSK-modulated signals,Gibbs sampler can be nearly 17 times lower in computation complexity when the approximately performance is obtained.…”
Get full text
Article -
10894
PET/SPECT Molecular Probes for the Diagnosis and Staging of Nonalcoholic Fatty Liver Disease
Published 2019-09-01“…While liver biopsy is considered as gold standard in the diagnosis and staging of liver fibrosis, noninvasive imaging technologies, including ultrasonography, computed tomography, single-photon emission computed tomography (SPECT), magnetic resonance imaging, and positron emission tomography (PET) could offer more sensitive, comprehensive, and quantitative measurement for NAFLD. …”
Get full text
Article -
10895
Low complexity radar signal classification based on spectrum shape
Published 2022-01-01“…In order to solve the problems of high computational complexity, low recognition accuracy of low signal to noise ratio (SNR) environment and low fidelity of simulation data in radar signal modulation recognition, a low complexity radar signal classification algorithm based on spectrum shape was proposed.Signal spectrum was normalized, feature parameters were extracted by spectrum sampling method, and then machine learning classification model was trained.The test results of the data generated by the radar signal source show that the classification accuracy of Barker code, Frank code, LFM code, BPSK, QPSK modulation and conventional radar signals is more than 90% (SNR≥3 dB).The algorithm has low computational complexity, can adapt to the change of signal parameters, and has good generalization.…”
Get full text
Article -
10896
Two-loop running effects in Higgs physics in Standard Model Effective Field Theory
Published 2024-12-01“…Abstract We consider the renormalization group equations within the Standard Model Effective Field Theory and compute two-loop contributions proportional to the top quark Yukawa coupling for the operator generating an effective Higgs-gluon coupling, focusing on the Yukawa-like operator. …”
Get full text
Article -
10897
Impact of Thin-Walled Projectiles with Concrete Targets
Published 1995-01-01“…A computational simulation of a test was conducted with an impact/penetration model created by linking a rigid-body penetration trajectory code with a general-purpose finite element code. …”
Get full text
Article -
10898
Phase retrieval for block sparsity based on adaptive coupled variational Bayesian learning
Published 2022-12-01“…Simulations indicate that the proposed algorithm outperforms the existing methods in success rate, noise‐robustness, and signal detection rate in large‐scale cases with acceptable computation complexity.…”
Get full text
Article -
10899
Case studies in numerical simulation of crack trajectories in brittle materials
Published 2012-04-01“…The “diffusion approximation” of the crack diffusion model represents crack trajectories as a one-dimensional Wiener process with advantage of well-developed mathematical formalism and simplicity of creating computer generated realizations (fractal dimension d = 1.5). …”
Get full text
Article -
10900
Lorentzian CFT 3-point functions in momentum space
Published 2020-01-01“…We explain how tensorial three-point correlators can be obtained and, in particular, compute the correlator with two identical scalars and one energy-momentum tensor. …”
Get full text
Article