Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
11261
Exact Group Sequential Methods for Estimating a Binomial Proportion
Published 2013-01-01“…Numerical issues are addressed for improving the accuracy and efficiency of computation. Computational experiments are conducted for comparing sampling schemes. …”
Get full text
Article -
11262
Efficient identity-based fully homomorphic encryption over NTRU
Published 2017-01-01“…Fully homomorphic encryption is the best solution for solving privacy concerns for data over cloud so far,while large public key size is a general shortcoming for existing schemes.First,by introducing the concept of Kullback-Leibler divergence,an identity-based public key scheme over NTRU lattice with modified ciphertext form was proposed.Analysis on parameter setting showed its small key size and ciphertext size,and experiments revealed its high computational efficiency.Second,with the idea of approximate eigenvector,an improved method to convert the scheme into an identity-based fully homomorphic encryption one was put forward to further reduce ciphertext size.Compared with existing schemes,the converted scheme not only abandons evaluation keys to make it fully identity-based,but also has smaller keys and ciphertext,which results in higher computational and transmission efficiency.…”
Get full text
Article -
11263
Development and Validation of a Complete GATE Model of the Siemens Inveon Trimodal Imaging Platform
Published 2013-10-01“…Fully incorporating the positron emission tomography (PET), single-photon emission computed tomography (SPECT), and computed tomography (CT) data acquisition subsystems, this model enables feasibility studies of new imaging applications, the development of reconstruction and correction algorithms, and the creation of a baseline against which experimental results for real data can be compared. …”
Get full text
Article -
11264
Direction-of-Arrival Estimation of Electromagnetic Pulse Based on Energy Distribution
Published 2024-01-01“…The method is based on energy distribution and improves the low accuracy and high computational complexity of the conventional estimation method. …”
Get full text
Article -
11265
Hybrid Metaheuristics for Solving a Fuzzy Single Batch-Processing Machine Scheduling Problem
Published 2014-01-01“…Finally, computational results on different-scale test problems are presented to compare the proposed algorithms.…”
Get full text
Article -
11266
We are entering a new era of problems: AI-generated images in research manuscripts
Published 2024-06-01“…This perspective's problem is pertinent not just to computer scientists. As individuals inside the scientific community, we actively participate in the peer-review process. …”
Get full text
Article -
11267
A network model for control of dengue epidemic using sterile insect technique
Published 2018-03-01“…The basic reproduction number has been computed. The existence and stability of various states have been discussed. …”
Get full text
Article -
11268
Real time interpolation algorithm based on Lanczos kernel
Published 2017-06-01“…In order to improve the timeliness and reliability of color image scaling algorithms,a high effective real-time color image scaling algorithm was proposed,which first generated the kernel look up table that could be used for whole target image based on Lanczos kernel,and interpolation of all target image pixels had only fixed point operation which had low computational complexity.Meanwhile,an optimized method for rasterizing pixels of target image was proposed,which needed little memory space but embraced high efficiency of memory utilization.The experiment results show that the proposed algorithm achieves good image quality,and the computational complexity is far more less than classic image scaling algorithms.So the proposed algorithm can effectively implement real-time resizing of color images and color videos in any scaling factors.…”
Get full text
Article -
11269
Improved Workload Distribution Scheme in Hybrid Cloud Setting
Published 2015-01-01“…An efficient and secure mechanism to partition computations across public and private machines in a hybrid cloud setting was explored. …”
Get full text
Article -
11270
Particle-in-cell simulation of laser wakefield accelerators with oblique lasers in quasicylindrical geometry
Published 2025-02-01“…In conventional methods, this is only possible in either two- or three-dimensional Cartesian geometries, which have the drawbacks of either lack of fidelity for the actual situation or requiring a huge amount of computational resources. In this work, we develop a new method that uses an expression-defined oblique laser field to simulate such situations in quasicylindrical geometry particle-in-cell simulations, having the advantages of both maintaining good fidelity and saving computational resources. …”
Get full text
Article -
11271
An interacting, higher derivative, boundary conformal field theory
Published 2024-12-01“…In precisely d = 6 dimensions, modules generated by d − 2 and d − 4 dimensional primaries merge to form a staggered module. We compute the conformal block associated with this module and show that it is a generalized eigenvector of the Casimir operator. …”
Get full text
Article -
11272
Coupling and Shielding Properties of the Baffle in ICP System
Published 2011-01-01“…Transparency of the baffle to RF magnetic fields is computed using a three-dimensional (3D) electromagnetic field solver. …”
Get full text
Article -
11273
Lightweight security architecture design for wireless sensor network
Published 2012-02-01“…Most previous security proposal did not consider key management or their authentication efficiency was very low.Lightweight security architecture and lightweight security algorithm were proposed for wireless sensor network,The problem of network encounters malicious nodes maybe occur in the procedure of backbone networks networking could be solved by threshold secret sharing mechanism.The lightweight ECC was proposed to optimize the CPK architecture based on normal ECC,authentication was efficient without the third-party CA,and could reduce the computational complexity,the key management could meet the resource limit in wireless sensor network,and the key security depended on the exponential computation complexity of the elliptic discrete logarithm decomposition.The scheme used the improved two-way authentication to ensure the communication security between common node and sink node,which could prevent man-in-the-middle attack.…”
Get full text
Article -
11274
Radiological assessment and follow-up of a nonsurgically treated odontoid process fracture after a motor vehicle accident in Egypt: a case report
Published 2023-12-01“…Severe or even fatal neurological deficits can occur due to associated cord injury, which can result in complete quadriplegia. Computed tomography is the primary diagnostic tool, while magnetic resonance imaging is used to evaluate any associated cord injuries. …”
Get full text
Article -
11275
Measuring. Monitoring. Management. Control
Published 2024-12-01“…The questions of classification of software for automating the process of analyzing bioinformational data of the genomic nature and new the principles for interpreting computational experiments in genomics are discussed. …”
Article -
11276
A Decomposition-Based Approach for the Multiperiod Multiproduct Distribution Planning Problem
Published 2014-01-01“…Our methods rely on appropriate definitions of polyhedrals and matrices that lead to LP problems comprising a set of sparse subproblems with special structures. Knowing that computational expenses of solving such a large-scale planning problem can be decreased by using decomposition techniques, the special structure of polyhedrals is utilized to develop algorithmic approaches based on decomposition techniques to handle the global problem aiming to save computational resources.…”
Get full text
Article -
11277
Adaptive Robust Quadratic Stabilization Tracking Control for Robotic System with Uncertainties and External Disturbances
Published 2014-01-01“…The validity of the proposed control scheme is shown by computer simulation of a two-link robotic manipulator.…”
Get full text
Article -
11278
Inverse Fourier Transform in the Gamma Coordinate System
Published 2011-01-01“…Also, we introduce a gamma coordinate system, analyze its properties, compute the Jacobian of the coordinate transform, and define weight functions for the inverse Fourier transform assuming a simple scanning model. …”
Get full text
Article -
11279
Saliency-Based Bleeding Localization for Wireless Capsule Endoscopy Diagnosis
Published 2017-01-01“…However, it requires much time for physicians to scan large amount of WCE images. Alternatively, computer-assisted bleeding localization systems are developed where color, edge, and intensity features are defined to distinguish lesions from normal tissues. …”
Get full text
Article -
11280
Linearizability Problem of Resonant Degenerate Singular Point for Polynomial Differential Systems
Published 2012-01-01“…Moreover, we establish a new recursive algorithm to compute the so-called generalized period constants for the origin of the transformed system. …”
Get full text
Article