Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Information technology 3
- Management 3
- Business 2
- Computer programs 2
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
- Design and construction 1
-
13421
Pin Row Loading Analysis of Scraper Conveyor under Oblique Cut Condition
Published 2016-01-01“…According to the force analysis of roller,the equation set of roller in the process of cutting by three- axis force is derived.Combining the MATLAB programming,the curve of the before and after roller load changing with the rotation angle under the oblique cut condition is obtained.With shearer machine as the research object,the whole machine mechanical equation is listed,the mathematical computing model is established.Based on MATLAB programming,combining with the before and after roller load changing curve under the oblique cut condition,the before and after sliding shoe load curves under the oblique cut condition is obtained.Due the contact relation between the sliding shoe and pin row and the principle of force mutual action,the curve of load acting on the pin rows under the oblique cut condition is achieved.And through the ANSYS Workbench simulation analysis,the stress distribution and deformation of pin rows of scraper conveyor are got.A reference for the future of design and analysis of damage causes of scraper conveyor pin row is provided.…”
Get full text
Article -
13422
New provable data transfer from provable data possession and deletion for secure cloud storage
Published 2019-04-01“…With the continuous and rapid development of cloud computing, it becomes more popular for users to outsource large-scale data files to cloud servers for storage and computation. …”
Get full text
Article -
13423
Hybrid Boson Sampling
Published 2024-10-01“…We propose boson sampling from a system of coupled photons and Bose–Einstein condensed atoms placed inside a multi-mode cavity as a simulation process testing the quantum advantage of quantum systems over classical computers. …”
Get full text
Article -
13424
Outsourced ciphertext-policy attribute-based encryption with partial policy hidden
Published 2020-05-01“…However, how to realize the attribute privacy concerns in the access policy and optimize the heavy computing overhead have been not adequately addressed. …”
Get full text
Article -
13425
Aerosol Distribution Due to Wildfire in Sumatra, Indonesia Considered from Model Simulation
Published 2025-05-01“…The results of this study show that the injection process in the model simulations has a significant impact on the aerosol distribution. …”
Get full text
Article -
13426
A Size-Perimeter Discrete Growth Model for Percolation Clusters
Published 2021-01-01“…Invasion percolation is a stochastic branching process in which a network of sites is getting occupied that leads to the formation of clusters (group of interconnected, occupied sites). …”
Get full text
Article -
13427
Use of hybrid quantum-classical algorithms for enhancing biomarker classification.
Published 2025-01-01“…Quantum machine learning (QML) combines quantum computing with machine learning, offering potential for solving intricate problems. …”
Get full text
Article -
13428
Research on enterprise digital transformation: A case study of Alibaba
Published 2024-01-01“…According to the research results of this paper, it is suggested that in the future digital transformation process, enterprises should strengthen investment in digital infrastructure and talent training, which is the most fundamental step of digital transformation.…”
Get full text
Article -
13429
Multi-version consolidation method for block-level backup data
Published 2011-01-01“…Historical version backup data query efficiency was dependent on the version chain length in a multi-version backup data storage system.A novel block-level backup data multi-version consolidation method was presented for this problem.Any version of a historical full system snapshot could be generated within the incremental backup data version sequence.Theoretical analysis showed that it could increase the target snapshot version query efficiency significantly in the version chain.A variable-length block version merging algorithm was presented to decrease the computing complex-ity in the process of snapshot version merging,according to the block-level backup data distribution features.Finally,the concrete applications and performance analysis for block-level version consolidation method was also introduced.The simulated experiments results expose that the version consolidation method can eliminate redundant version of backup data with the same version chain length,and it can increase full system recovery efficiency than traditional methods sig-nificantly.…”
Get full text
Article -
13430
Model Building and Simulation of the Electric Brake Energy of Urban Rail Vehicle
Published 2011-01-01“…By analyzing conditions that urban rail vehicles in the traction power supply network occur the regenerative braking or resistor braking in electric braking process, and depending on the grouping of vehicles, lines, load, run strategy, operation plans, traction power supply and other basic conditions, based on single vehicle computing model and multi-vehicles power supply network model, electric braking energy distribution model were established and simulation were carried out. …”
Get full text
Article -
13431
TraIL: Pinpoint Trajectory for Indoor Localization
Published 2015-11-01“…Indoor localization on smartphones is an enabler for a number of ubiquitous and mobile computing applications attracting worldwide attentions. …”
Get full text
Article -
13432
Torsion point attacks on ‘SIDH‐like’ cryptosystems
Published 2023-03-01“…The best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman protocol (SIDH); this protocol was turned into the CCA‐secure key encapsulation mechanism SIKE, which was submitted to and remains in the third round of NIST's post‐quantum standardisation process as an ‘alternate’ candidate. Isogeny‐based cryptography generally relies on the conjectured hardness of computing an isogeny between two isogenous elliptic curves, and most cryptanalytic work referenced on SIKE's webpage exclusively focusses on that problem. …”
Get full text
Article -
13433
Flipping the Classroom for higher Education Learners to Improve Productive and Receptive Skills
Published 2020-01-01“…Overall, the results of the study have shown the positive impact of this method on the teaching/learning process in the EFL classes for Tourism students, contributing to their motivation and development of their professional skills.…”
Get full text
Article -
13434
Research on Anti-Interference Performance of Spiking Neural Network Under Network Connection Damage
Published 2025-02-01“…Background: With the development of artificial intelligence, memristors have become an ideal choice to optimize new neural network architectures and improve computing efficiency and energy efficiency due to their combination of storage and computing power. …”
Get full text
Article -
13435
Leveraging Local LLMs for Secure In-System Task Automation With Prompt-Based Agent Classification
Published 2024-01-01“…Every module is has its own function, including file search, document summarization, code interpretation, and general tasks, to make certain that all processing happens locally on the user’s device. …”
Get full text
Article -
13436
Integrative modeling of the spread of serious infectious diseases and corresponding wastewater dynamics
Published 2025-06-01Get full text
Article -
13437
-
13438
An information theoretic limit to data amplification
Published 2025-01-01“…This is not the only way to amplify data so this process will be referred to as data amplification which is studied using information theoretic concepts. …”
Get full text
Article -
13439
The glass transition temperature investigation of polymers by molecular dynamic simulations
Published 2023-12-01“… In this paper, the process of glass transition is studied, the theory of which is not fully developed. …”
Get full text
Article -
13440
Dynamic Cascade Detector for Storage Tanks and Ships in Optical Remote Sensing Images
Published 2025-05-01Get full text
Article