Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
10921
Applications of magnesium iodide structure via modified-polynomials
Published 2024-06-01“…Randić index, and inverse Randić indices based M-polynomials are also computed in this work.…”
Get full text
Article -
10922
Encoding Interruptions in Parliamentary Data: From Applause to Interjections and Laughter
Published 2022-06-01“…Furthermore, I will discuss whether these encodings are suitable for computer-based quantitative analysis of parliamentary interruptions. …”
Get full text
Article -
10923
Trust expansion and listwise learning-to-rank based service recommendation method
Published 2018-01-01“…In view of the problem of trust relationship in traditional trust-based service recommendation algorithm,and the inaccuracy of service recommendation list obtained by sorting the predicted QoS,a trust expansion and listwise learning-to-rank based service recommendation method (TELSR) was proposed.The probabilistic user similarity computation method was proposed after analyzing the importance of service sorting information,in order to further improve the accuracy of similarity computation.The trust expansion model was presented to solve the sparseness of trust relationship,and then the trusted neighbor set construction algorithm was proposed by combining with the user similarity.Based on the trusted neighbor set,the listwise learning-to-rank algorithm was proposed to train an optimal ranking model.Simulation experiments show that TELSR not only has high recommendation accuracy,but also can resist attacks from malicious users.…”
Get full text
Article -
10924
Intelligent Fault Diagnosis of Machines Based on Adaptive Transfer Density Peaks Search Clustering
Published 2021-01-01“…Combined with the wavelet packet energy feature extraction algorithm, the proposed algorithm can enhance the computational accuracy and reduce the computational time consumption. …”
Get full text
Article -
10925
Physics-Informed Neural Network-Based Input Shaping for Vibration Suppression of Flexible Single-Link Robots
Published 2025-01-01“…With the use of powerful computational resources to handle multimode information about the vibration, the PINN-based approach outperforms traditional input-shaping methods in terms of computational efficiency and performance. …”
Get full text
Article -
10926
Iterative multistage adaptive Rake receiver for CDMA wireless system
Published 2005-01-01“…The system parameters for each stage can be obtained through a simple iterative procedure, no complicated computation is required. The proposed system gives a reduced computational complexity compared to an AV system with similar performance. …”
Get full text
Article -
10927
Proxy re-signature scheme based on isomorphisms of polynomial
Published 2017-02-01“…Most of the existing proxy resignature schemes were based on the hardness of big integer factoring,discrete logarithm,elliptic curve.However,none of them can resist the attack by a quantum computer.Motivated by these concerns,a new proxy resignature scheme was proposed.By employing secret affine transformations and homogeneous polynomials,the proposed scheme could implement the signature transformation with high-efficiency,and meanwhile it was secure against the attack by a quantum computer.The results of analysis showed that the proposed scheme was correct and consistent,and had the unforgeability in the random oracle model.Compared with the existing schemes,the proposed scheme not only inherits the resistance to quantum attack and high efficiency from the multivariate public key cryptosystems,but also has the properties of multi-use,transparent and private proxy.…”
Get full text
Article -
10928
Efficient fuzzy attribute-based signcryption scheme
Published 2013-08-01“…Compared with other analysis, the amount of computation of signcryption and designcryption is only (n+3)e and ne+(n+4)p, far less than those of other similar schemes and this realizes the efficiency of computation.…”
Get full text
Article -
10929
Numerical implementation of a multiaxial cyclic plasticity model for the Local Strain Method in low cycle fatigue
Published 2014-10-01“…Very often computations on structural elements or machine components subjected to variable loading require using an advanced finite element model. …”
Get full text
Article -
10930
Path assessment based network admission control algorithm
Published 2010-01-01“…The local link state metrics were measured by scheduler.At the same time,the stale path state metrics could be got from the router.The basic probability assignment functions of above metrics were described by the fuzzy state variableness.The path situation and the corresponding probability could be computed through data fusion based on Dempster rule.Then the path situation with the maximum probability would be regarded as the quasi-real-time path state.Network admission decision was made based on the estimated path state.Simulations show that the link utility of proposed policy has twice as the budget based network admission control under the similar blocking rate.And the complexity of network mechanism can be decreased by adding pre-computed at the edge to achieve coreless status in multi-hop networks.…”
Get full text
Article -
10931
Modular representations of Loewy length two
Published 2003-01-01“…We also compute the number of isomorphism classes of indecomposable K[G]-modules M such that dimK(Rad(M))=1.…”
Get full text
Article -
10932
Development of an Equivalent Force Method and an Application in Simulating the Radiated Noise from an Operating Diesel Engine
Published 1999-01-01“…The effect of two structural design modifications on the radiated noise is computed, and conclusions are deduced.…”
Get full text
Article -
10933
Improving deep convolutional neural networks with mixed maxout units
Published 2017-07-01“…The maxout units have the problem of not delivering non-max features, resulting in the insufficient of pooling operation over a subspace that is composed of several linear feature mappings,when they are applied in deep convolutional neural networks.The mixed maxout (mixout) units were proposed to deal with this constrain.Firstly,the exponential probability of the feature mappings getting from different linear transformations was computed.Then,the averaging of a subspace of different feature mappings by the exponential probability was computed.Finally,the output was randomly sampled from the max feature and the mean value by the Bernoulli distribution,leading to the better utilizing of model averaging ability of dropout.The simple models and network in network models was built to evaluate the performance of mixout units.The results show that mixout units based models have better performance.…”
Get full text
Article -
10934
Experimental and Numerical Simulations Predictions Comparison of Power and Efficiency in Hydraulic Turbine
Published 2011-01-01“…Inlet boundary conditions for the runner were obtained from a previous simulation conducted in the spiral case. The computed results at the runner's outlet were used to conduct the subsequent draft tube simulation. …”
Get full text
Article -
10935
Related-key impossible boomerang cryptanalysis on LBlock
Published 2017-05-01“…The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlock against this method were investigated.A new attack on 22-round LBlock was presented combining impossible boomerang attacks with related-key attacks.A 15-round related-key impossible boomerang distinguisher was constructed.Based on the new distinguisher,an attack on 22-round LBlock was mounted successfully by concatenating 3-round to the beginning and 4-round to the end.The attack on 22-round LBlock required data complexity of only 2<sup>51.3</sup>plaintexts and computational complexity of about 2 <sup>71.54</sup>22-round encryptions.Compared with published cryptanalysis results on 22-round LBlock,proposed attack has great advantages on data and computational complexities.…”
Get full text
Article -
10936
A Study on the Efficient Method for the Solution of the Saha Equation in the Numerical Simulation of Capillary Discharge
Published 2017-01-01“…In order to improve the computational efficiency, this coefficient is further optimized and the methods of setting the iteration initial value dynamically are introduced. …”
Get full text
Article -
10937
A Thermochemical Parameters and Theoretical Study of the Chlorinated Compounds of Thiophene
Published 2019-01-01“…This contribution sets out to compute thermochemical and geometrical parameters of the complete series of chlorinated isomers of thiophene based on the accurate chemistry model of CBS-QB3. …”
Get full text
Article -
10938
Periprosthetic Fracture of Greater Trochanter in Total Hip Replacement Stemming from Pin Site Placement in Navigation-Assisted Surgery
Published 2019-01-01“…Surgeons are looking to use computer computer-assisted surgery (CAS) in total hip arthroplasty (THA) in order to quantify leg length measurement, angular cup placement, and enhance stability to provide enhanced accuracy in implant placement. …”
Get full text
Article -
10939
Beamforming algorithm for cognitive satellite and terrestrial network based on UAV relay
Published 2021-08-01“…Two beamforming (BF) schemes to achieve spectrum sharing by suppressing inter-system interferences in cognitive satellite and terrestrial networks were proposed, where the satellite and UAV cooperative network was used as the secondary network, while the terrestrial network was used as the primary network.Specifically, considering that only the statistical channel state information was available, a constrained optimization problem was formulated to maximize the signal-to- interference-plus-noise ratio of the secondary user under the constraints of the maximum transmit power at the UAV and the interference power of the primary user.Then, an iteration-based BF scheme was proposed to solve the constrained optimization problem.To reduce the computational complexity of the iterative algorithm, a zero-forcing based BF scheme was further proposed.Finally, computer simulations verify the correctness and effectiveness of the proposed BF schemes.…”
Get full text
Article -
10940
Vector Bond Graph Method of Kineto-static Analysis for Planar Multi-body System with Gear Pair
Published 2015-01-01“…In order to increase the reliability and efficiency of the kineto-static analysis of complex planar multi-body system,the corresponding vector bond graph method is proposed.According to the kinematic constraint condition,the vector bond graph model of a gear pair with arbitrary tooth profile of tooth is built.Based on this,the theoretical method to build the planar multi-body systems model with gear pair by vector bond graph is given.For the algebraic difficulties brought by differential causality and nonlinear junction structure in modeling and kineto-static analysis of planar multi-body systems with gear pair,the effective bond graph augment method is proposed.By the corresponding algorithm,the computer aided modeling and kineto-static analysis of planar multi-body system with gear pair on a computer is realized,the validity of this method is illustrated.…”
Get full text
Article