Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
2741
Anatomic characteristics of the lacrimal sac and adjacent bony structures–a computed tomographic-dacryocystography research
Published 2025-02-01“…Horizontally, the junction between the maxillary bone and the lacrimal bone (MB-LB) was close to, mostly (60.2%) posterior to, the lacrimal sac. The uncinate process was more frequently attached to the lacrimal bones (75.1%). …”
Get full text
Article -
2742
Deep Knowledge Tracing Model Integrating Learning Process and Behavior
Published 2024-10-01Get full text
Article -
2743
Harnessing advanced computational approaches to design novel antimicrobial peptides against intracellular bacterial infections
Published 2025-08-01“…This study presents a novel computational framework for efficiently screening candidate peptides against these infections. …”
Get full text
Article -
2744
-
2745
-
2746
Advances in Multi-Source Navigation Data Fusion Processing Methods
Published 2025-04-01“…In the future, with the widespread adoption of technologies such as 5G, the Internet of Things, and edge computing, multi-source navigation data fusion is expected to evolve towards real-time processing, intelligence, and distributed systems. …”
Get full text
Article -
2747
Identifying method for opinion leaders in social network based on competency model
Published 2014-11-01Get full text
Article -
2748
OPTIMIZATION OF TOPOLOGICAL STRUCTURES OF CENTRALIZED LOGISTICS NETWORKS IN THE PROCESS OF REENGINEERING
Published 2021-03-01“…The purpose of the work is to create a mathematical model and methods for solving problems of optimization of topological structures of centralized logistics networks in the process of reengineering, taking into account many topological and functional constraints. …”
Get full text
Article -
2749
Catastrophic lava flow levee failure: precursors, processes, and implications
Published 2025-01-01Get full text
Article -
2750
-
2751
A Kind of OpenStack Auto-Deployment Architecture Based on Workflow
Published 2014-11-01Get full text
Article -
2752
Design and validation for a remote attestation security protocol
Published 2009-01-01“…By analyzing current remote attestation model, an improved remote attestation model was provided and de-signed.In order to verify whether it conforms to security requirement, a formal analysis method CSP was used to analyze the protocol and model it with CSP method.Meanwhile, it was checked with FDR tool.A loophole of the protocol was found.For solving the problem, an improvement to the protocol was made.It has been verified that security properties can be guaranteed by the re-validate.This protocol can be used for the remote attestation in trust computing and it can ensure the secrecy, integrity, authentication and freshmen in the interoperation process of the protocol.…”
Get full text
Article -
2753
Ionic-electronic photodetector for vision assistance with in-sensor image processing
Published 2025-08-01“…Artificial photodetectors attempt to mimic vision but often require complex processing to overcome these limitations. Thus, developing photodetectors that complement human vision is crucial to overcoming these limitations. …”
Get full text
Article -
2754
Exploration and Practice of Cloud Platform About Supporting Telecom Operators Intensive Management
Published 2013-08-01“…One solution was presented that telecom operators can achieve whole network resource intensive management by building centralized and unified cloud platform.Some problems were analyzed in detail and further resolved when bringing into and managing resource.The unified management,unified dispatch and unified presentation of resource by decentralization of authority and domain can be achieved,automatic opening of service by means of process connection can be achieved.The usage and use efficiency of monitored resource were also discussed combined with the actual application in cloud computer platform,which can provide evidence for intensive usage of resource.…”
Get full text
Article -
2755
Spin coupling is all you need: Encoding strong electron correlation in molecules on quantum computers
Published 2025-02-01“…The performance of quantum algorithms for eigenvalue problems, such as computing Hamiltonian spectra, depends strongly on the overlap of the initial wave function and the target eigenvector. …”
Get full text
Article -
2756
Efficient distributed model sharing strategy for data privacy protection in Internet of vehicles
Published 2022-04-01Get full text
Article -
2757
Conjugate Gradient Algorithm Based on Aitken's Process for Training Neural Networks
Published 2014-07-01Get full text
Article -
2758
Design of OpenFOAM mesh generation client software based on C/S architecture
Published 2022-02-01“…To meet the requirements of human-computer interaction of OpenFOAM deployed in the cloud GUI, this paper designs and implements an OpenFOAM mesh generation client software. …”
Get full text
Article -
2759
TPCM-based trusted PXE boot method for servers
Published 2020-12-01“…The PXE startup mechanism downloads operating system files through the network and starts the operating system,which is widely used in server network startup.It is widely used in server network startup.The PXE boot process is secured and trusted through trusted computing technology to prevent the PXE boot file from being tampered with maliciously,ensuring the safe and reliable operation of the server.The cyber security classified protection standard requires that the system boot program and system program of the server device be trusted and verified based on the trusted root.A TPCM-based server trusted PXE boot method based on the requirements of classified protection standard was proposed to ensure the security and trust of the server's BIOS firmware,PXE bootfiles,and Linux system files.When the server performs PXE boot,TPCM measured BIOS firmware,BIOS boot environment measured PXE boot files,and PXE boot environment measured Linux system files.Taking TPCM as the root of trust,one level of measurement,one level of trust,and a chain of trust were established to achieve a trusted server operating environment.The proposed method was tested on a domestically-controlled,self-controllable Shenwei server.The experimental results show that the proposed method is feasible.…”
Get full text
Article -
2760
Rehabilitation and Motion Symmetry Analysis With a TACX Smart Cycling Trainer Using Computational Intelligence
Published 2025-01-01“…In general, the paper presents selected processing methods and experimental results pointing to the effectiveness of computational intelligence in motion analysis.…”
Get full text
Article