Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 9
- Computer programs 9
- computer 8
- Information technology 7
- Management 7
- Business 6
- Design and construction 5
- Computer security 4
- Data processing 4
- Design 4
- Human-computer interaction 4
- Language and languages 4
- Security measures 4
- Application software 3
- Computer animation 3
- Computer graphics 3
- Computer science 3
- Computer-aided design 3
- Computer-assisted instruction 3
- Digital techniques 3
- History 3
- Internet 3
- LANGUAGE ARTS & DISCIPLINES / Communication Studies 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / General 3
- LANGUAGE ARTS & DISCIPLINES / Linguistics / Sociolinguistics 3
- Moral and ethical aspects 3
- Photography 3
- Sociolinguistics 3
- Web sites 3
- Anesthetics 2
-
11281
Electronic evidence sharing scheme of Internet of vehicles based on signcryption and blockchain
Published 2021-12-01“…To solve the problems of privacy and security in the electronic evidence sharing of Internet of vehicles, a sharing scheme of electronic evidence in the Internet of vehicles based on signcryption and blockchain was proposed.The evidence ciphertext and the evidence report were stored in the cloud server and the block chain respectively to realize the secure storage and sharing of the electronic evidence.The identity-based signcryption technology was used to ensure the confidentiality of data, and the proxy re-encryption technology was used to realize the sharing of electronic evidence of Internet of vehicles by insurance companies.The aggregation signature technique was introduced to reduce the computation cost of multi vehicle user signature verification.The reliability of electronic evidence was improved by using credibility incentive mechanism.Security analysis shows that the proposed scheme achieves data confidentiality, integrity, verifiability and unforgeability.Compared with the existing schemes, the proposed scheme has certain advantages in terms of computational overhead.…”
Get full text
Article -
11282
Block-Based Mode Decomposition in Few-Mode Fibers
Published 2025-01-01“…A block-based mode decomposition (BMD) algorithm is proposed in this paper, which reduces computational complexity and enhances noise resistance. …”
Get full text
Article -
11283
An application of potential function in robot path planning and three optimized formulas for equivalent resistance
Published 2024-12-01“…These findings provided new perspectives and tools for the computation of resistor networks and the design of path planning algorithms.…”
Get full text
Article -
11284
Agent Based Modeling on Organizational Dynamics of Terrorist Network
Published 2015-01-01“…Modeling organizational dynamics of terrorist network is a critical issue in computational analysis of terrorism research. The first step for effective counterterrorism and strategic intervention is to investigate how the terrorists operate with the relational network and what affects the performance. …”
Get full text
Article -
11285
Problems on the teaching of geometry in comprehensive schools for 21st century
Published 2001-12-01“…The purpose is to examine some influence of computer technology in the teaching and learning of geometry. …”
Get full text
Article -
11286
Detection for physical-layer network coding in two-way relay channels
Published 2012-02-01“…The detection for physical-layer network coding (PNC) in two-way relay channels was investigated.Maximum-likelihood (ML) detection not only had great performance but also had high computational complexity.Therefore,without channel state information (CSI) at source nodes,two detection schemes were proposed.The first scheme was likelihood ratio(LR)detection based on LR function,and the other was maximum a posteriori probability (MAP) detection based on MAP rule.Meanwhile,It carried out similar analysis if CSI was available at source nodes.Compared to ML detection which separately detects two source messages,numerical and simulation results show that LR detection outperforms it in terms of BER metric with the requirement for additional noise variance information.And MAP detection is equivalent to ML detection,and it has lower computational complexity.…”
Get full text
Article -
11287
Exploring the electronic and magnetic properties of half-heusler alloy CoMnSb: implications for spintronics
Published 2025-01-01“…In this study, we investigated the electronic and magnetic properties of CoMnSb by employing advanced computational methods rooted in Density functional theory and plane-wave pseudo potential approach. …”
Get full text
Article -
11288
Usage of double injector for efficient mixing of the fuel behind the ramp injector at supersonic combustion chamber
Published 2025-01-01“…Abstract This investigation presents extensive computational analyses of the compressible flow near ramp injector with double circular injectors at supersonic combustor of scramjet engine. …”
Get full text
Article -
11289
An Improved Distributed Multi-User Cooperative Spectrum Sensing Method Based on DCS
Published 2013-11-01“…However, it increases computational complexity in the process of signal reconstruction. …”
Get full text
Article -
11290
Testing the lepton content of the proton at HERA and EIC
Published 2025-01-01“…These PDFs have been recently computed and can be used to define lepton-induced processes at high-energy colliders. …”
Get full text
Article -
11291
A Benders Decomposition Algorithm for the Passenger Train Service Planning
Published 2021-01-01“…In addition, we analyze the computational complexities of the model and develop a Benders decomposition algorithm with valid inequalities to solve this problem. …”
Get full text
Article -
11292
A quadratic $$\nu $$ ν -support vector regression approach for load forecasting
Published 2025-01-01“…The results of some extensive computational experiments on the electric load data from the Global Energy Forecasting Competition 2012 and the ISO New England demonstrate better average accuracy of the proposed model.…”
Get full text
Article -
11293
A Domain Decomposition Method for Hybrid Shell Vector Element with Boundary Integral Method
Published 2012-01-01“…By this method, the whole computational domains are divided into sub-SVE domains and boundary element domains. …”
Get full text
Article -
11294
Blastomycosis Presenting as Multiple Splenic Abscesses: Case Report and Review of the Literature
Published 2010-01-01“…Computed tomographic-guided needle biopsy showed necrotizing granulomatous inflammation and multinucleated giant cells. …”
Get full text
Article -
11295
Unbiased Diffusion through a Linear Porous Media with Periodic Entropy Barriers: A Tube Formed by Contacting Ellipses
Published 2015-01-01“…Mathematical expressions are presented and contrasted against computational simulations to validate them.…”
Get full text
Article -
11296
Nonlinear Thermal Response Analysis of an Internally Heated Radiative-Convective Porous Fin subjected to Magnetic Fields using Method of Lines
Published 2022-11-01“…To establish the computational accuracy of the method, the results of the solution are compared with the results of the developed exact analytical method. …”
Get full text
Article -
11297
Super Partition: fast, flexible, and interpretable large-scale data reduction in R
Published 2025-01-01“…In an initial step, Genie, a fast, hierarchical clustering algorithm, forms a super-partition, thereby increasing the computational tractability by allowing Partition to be applied to the subsets. …”
Get full text
Article -
11298
First-principles investigation on the brittleness mechanism of TiAl alloys and the effect of doping
Published 2025-03-01“…The elastic properties of the structure-optimized materials are computed, and the single-crystal and polycrystalline elastic constants are obtained to explain the intrinsic brittleness mechanism of TiAl alloys. …”
Get full text
Article -
11299
Maximum Likelihood Inference for Univariate Delay Differential Equation Models with Multiple Delays
Published 2017-01-01“…We also develop methodology to compute the information matrix and confidence intervals for all unknown parameters based on the likelihood inferential framework. …”
Get full text
Article -
11300
On the Simplex-based methods for Neutrosophic linear programming problems
Published 2024-12-01“…To solve this gap, we consider NLP and propose an effective, simple model that can significantly reduce computational tasks and address these deficits in the mentioned models. …”
Get full text
Article