Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
4961
-
4962
Characterization and modeling of laser transmission welded polyetherketoneketone (PEKK) joints: Influence of process parameters and annealing on weld properties
Published 2024-11-01“…PEKK, being a semi-crystalline thermoplastic, requires additional care during processing due to its propensity to crystallize. This study presents both experimental and numerical investigations into LTW of PEKK molded parts, aiming to understand the influence of welding parameters and crystallinity on weld joint morphology and mechanical properties. …”
Get full text
Article -
4963
Linear and nonlinear multidimensional functional connectivity methods reveal similar networks for semantic processing in EEG/MEG data
Published 2025-07-01“…IntroductionInvestigating task- and stimulus-dependent connectivity is key to understanding how the interactions between brain regions underpin complex cognitive processes. Yet, the connections identified depend on the assumptions of the connectivity method. …”
Get full text
Article -
4964
Effect of a single ultra processed meal on myocardial endothelial function, adenosine mediated effects and cognitive performances
Published 2025-08-01“…This study aimed to evaluate the impact of a single ultra-processed meal on myocardial blood flow (MBF), measured using positron emission tomography/computed tomography (PET/CT), and its effects on cognitive performance. …”
Get full text
Article -
4965
Distributionally robust hybrid energy management in smart mining using process-coupled primal-dual mirror descent
Published 2025-07-01“…Mining safety regulations are integrated via chance constraints, embedding safety-critical margins related to pressure, airflow, and gas concentration. To alleviate the computational burden caused by nested risk formulations, a Primal-Dual Reformulated Distributionally Robust Process Scheduling (PDR-DRPS) algorithm is proposed. …”
Get full text
Article -
4966
-
4967
-
4968
The effectiveness of endobronchial therapy in patients with chemo-resistant tuberculosis when specific process is localized in the lungs apical segments
Published 2017-08-01“…Results of the study were processed with modern methods of analysis on a personal computer with using the Statistical Package license software Statistica® for Windows 6.0 (StatSoft Inc., № AXXR712 D833214FAN5). …”
Get full text
Article -
4969
-
4970
Ultra-secure quantum protection for e-healthcare images: Hybrid chaotic one-time pad with cipher chaining encryption framework
Published 2025-08-01“…Abstract Quantum computing introduces major threats to conventional image encryption methods, especially in medical contexts. …”
Get full text
Article -
4971
Design of miner type identification mechanism based on reputation management model
Published 2022-02-01“…In the public mining pool, miners can freely enter the mining pool to submit proof of work to obtain rewards, and there are no conditions to restrict different types of miners.There will be malicious miners submitting invalid workloads and miners not submitting workloads in the mining pool, occupying the verification computing resources of the mining pool, reducing the verification efficiency of the mining pool, and causing the mining pool system to collapse.Aiming at the problem that it is difficult to distinguish the type of miners in the mining pool, which leads to the collapse of the mining pool system, a reputation management mechanism was introduced to measure the behavior of miners, and contracts were deployed to prevent miners from colluding with the pool manager.A design of miner type identification mechanism based on reputation management model was proposed.A reputation mechanism was constructed to measure the behavior of miners.When a miner conducts malicious behavior, the miner's reputation value would be lowered.When the miner's reputation value was less than the reputation threshold of the mining pool, the system would remove the miner, so that the miner can no longer enter the mining pool to submit proof of work and get rewards.The miners in the mining pool were dynamically updated by Markov process, so that the miners in the mining pool were conducting honest behaviors and submitting proof of work.At the same time, a reward system was designed to motivate the miners in the mining pool, and smart contracts were deployed in the mining pool to prevent miners from collusion with the mining pool manager.Finally, analyzing the scheme from the perspective of security and performance, the proposed scheme was not only safe in the process of miners submitting proof of workload, but also solved the problem of identifying miner types in public mining pools, thereby solving the problem of malicious miners submitting invalid workloads, eliminating malicious miners, and avoiding mining pools verifying invalid workloads, to improve the verification efficiency of the mining pool.…”
Get full text
Article -
4972
Digital Measurement Method for Main Arch Rib of Concrete-Filled Steel Tube Arch Bridge Based on Laser Point Cloud
Published 2025-07-01Subjects: Get full text
Article -
4973
Heterogeneous virus classification using a functional deep learning model based on transmission electron microscopy images
Published 2024-11-01Subjects: Get full text
Article -
4974
Hyperresearch use in the compilation and analysis of qualitative data
Published 2001-08-01Get full text
Article -
4975
METHODS OF APPROXIMATION OF FUNCTIONS BY GENERALIZED POLYNOMIALS IN NUMERICAL ANALYSIS PROBLEMS RELATED TO CALCULATIONS ON APPROXIMATE DATA
Published 2022-09-01Subjects: Get full text
Article -
4976
Algorithmic Analysis of Queuing System with Varying Number of Servers, Phase-Type Service Time Distribution, and Changeable Arrival Process Depending on Random Environment
Published 2025-06-01“…Using the tools of the corresponding processes or chains, a stationary analysis of the system is implemented. …”
Get full text
Article -
4977
TurboPixels: A Superpixel Segmentation Algorithm Suitable for Real-Time Embedded Applications
Published 2024-12-01“…In recent years, the importance of superpixel segmentation has increased in computer vision since it offers useful primitives for extracting image features and simplifies the complexity of other image processing steps. …”
Get full text
Article -
4978
-
4979
Enhanced Localisation and Handwritten Digit Recognition Using ConvCARU
Published 2025-06-01Get full text
Article -
4980