Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
11241
-
11242
Linear SVM-Based Android Malware Detection for Reliable IoT Services
Published 2014-01-01Get full text
Article -
11243
Iterative Linear Quadratic Optimization for Nonlinear Control: Differentiable Programming Algorithmic Templates
Published 2024-11-01“…In a differentiable programming framework, this information, such as gradients, can be automatically derived from the computational graph. We explore how nonlinear control algorithms, often employing linear and/or quadratic approximations, can be effectively cast within this framework. …”
Get full text
Article -
11244
Lip print‐based identification using traditional and deep learning
Published 2023-01-01“…This article compares traditional and deep learning computer vision methods and how they perform on a common dataset for lip‐based identification. …”
Get full text
Article -
11245
Spatial Object Tracking Using an Enhanced Mean Shift Method Based on Perceptual Spatial-Space Generation Model
Published 2013-01-01“…Object tracking is one of the fundamental problems in computer vision, but existing efficient methods may not be suitable for spatial object tracking. …”
Get full text
Article -
11246
ATBHC-YOLO: aggregate transformer and bidirectional hybrid convolution for small object detection
Published 2024-11-01“…Abstract Object detection using UAV images is a current research focus in the field of computer vision, with frequent advancements in recent years. …”
Get full text
Article -
11247
Medical Knowledge Graph: Data Sources, Construction, Reasoning, and Applications
Published 2023-06-01Get full text
Article -
11248
Modeling the effect of information campaigns on the HIV epidemic in Uganda
Published 2008-09-01Get full text
Article -
11249
Layer-Based Data Aggregation and Performance Analysis in Wireless Sensor Networks
Published 2013-01-01Get full text
Article -
11250
-
11251
Automated Diagnosis of Coronary Artery Disease: A Review and Workflow
Published 2018-01-01Get full text
Article -
11252
Improve Fine-Grained Feature Learning in Fine-Grained DataSet GAI
Published 2025-01-01“…During training, only a slight increase in computation is required, and the SpiltAtt structure is deleted after the training is completed. …”
Get full text
Article -
11253
Analysis of the Magnetic Anomalies of Buried Archaeological Ovens of Aïn Kerouach (Morocco)
Published 2018-01-01“…In order to find the maximum depth of the sources, we computed the enhanced downward continuation filter in order to highlight the magnetization contrasts in high detail, depending on the depth downward included in the computation. …”
Get full text
Article -
11254
Research of the Robot Arm Gravity Compensation based on the Genetic Algorithm for Optimization of Neural Network
Published 2017-01-01“…By adopting a genetic algorithm for optimization of neural network,the gravity compensation for robot arm is researched.Firstly,through the basic knowledge of mechanics and D-H parameter to set up robot kinematics model,the theoretical computation formula of the gravity item of each joint torque in robot arm is got.Secondly,in the Solid Works simulation software,the simulation value of the gravity item in some certain pose got,thus the correctness of the theoretical computation formula is verified.Finally,the predicted value of the gravity item by genetic algorithm for optimization of neural network is obtained.Experimental results show that the predicted value of gravity items of robot arm learnt with this method is basically conforming with the theoretical value.Consequently,the work load of calculation for the gravity items of robot arm is effectively reduced.Furthermore,this method provide a possible way for the real-time control.…”
Get full text
Article -
11255
Smoothing Estimation of Parameters in Censored Quantile Linear Regression Model
Published 2025-01-01“…Thus, the parameters of the regression model can be computed by using the gradient-based iterative algorithm. …”
Get full text
Article -
11256
Concise Neural Nonaffine Control of Air-Breathing Hypersonic Vehicles Subject to Parametric Uncertainties
Published 2017-01-01“…The special contributions are that the control architecture is concise and the computational cost is low. Moreover, the exploited controller possesses good practicability since there is no need for affine models. …”
Get full text
Article -
11257
An Elite Decision Making Harmony Search Algorithm for Optimization Problem
Published 2012-01-01“…The computational results show that the proposed new algorithm is competitive in finding solutions with the state-of-the-art harmony search variants.…”
Get full text
Article -
11258
AONT-and-NTRU-based rekeying scheme for encrypted deduplication
Published 2021-10-01“…Rekeying is a good way to protect against key exposure.Most of the existing encrypted deduplication systems are implemented based on message-locked-encryption, in which multiple users with the identical data share the same encryption key.When a user updates keys, that update must be followed by all other data owners, which will incur large computational and communicational overheads.To solve this problem, an AONT-and-NTRU-based rekeying scheme was proposed, a variant of AONT was designed to solve the synchronization problem of multi-user rekeying, and a proxy re-encryption algorithm based on NTRU was introduced to reduce the communicational overhead for the system and computational overhead for clients during rekeying.The efficiency analysis and experimental results show that the proposed scheme has better encryption and decryption efficiency than existing schemes and the time cost of rekeying is significantly reduced.…”
Get full text
Article -
11259
Biodiesel Production by Reactive Flash: A Numerical Simulation
Published 2016-01-01“…The RF was modeled by an index-2 system of differential algebraic equations, the vapor split (ϕ) was computed by modified Rachford-Rice equation and modified Raoult’s law computed bubble point, and the continuation analysis was tracked on MATCONT. …”
Get full text
Article -
11260
Research on Amplifier Performance Evaluation Based on δ-Support Vector Regression
Published 2014-01-01“…And this is also suitable for promotion computational speed.…”
Get full text
Article