Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
13321
Strong Convergence Theorems of Modified Ishikawa Iterative Method for an Infinite Family of Strict Pseudocontractions in Banach Spaces
Published 2011-01-01“…We introduce a new modified Ishikawa iterative process and a new W-mapping for computing fixed points of an infinite family of strict pseudocontractions mapping in the framework of q-uniformly smooth Banach spaces. …”
Get full text
Article -
13322
Formal specification and security verification of usage control model based on PAT
Published 2016-03-01“…Then the reachable space of combined processes was the desired space. Finally, the security analysis method based on the reachable space and the conflict analysis of access control policies based on the equivalent checking in process algebras were proposed for UCON model. …”
Get full text
Article -
13323
Influence diffusion model based on affinity of dynamic social network
Published 2016-10-01“…Recently,influence maximization model is a hot issue in the field of social network influence,while the traditional independent cascade model is generally based on static network with a fixed value of activation probability.DDIC model,which was a dynamic network influence diffusion model with attenuation factor was proposed.It calculated the activation probability between nodes via affinity propagation,and according with dynamic segmentation of social network time slice,calculation of influence on proliferation of next time slice with the current time slice of activation probability performance decay.The experimental results show that the nodes in the DDIC model have more chances to active the neighbor and the average probability of activing of the DDIC model is higher.Further experiments show that influence value via computing with affinity propagation can reflect the process of the spread model more accurately.…”
Get full text
Article -
13324
Feynman integrals: Synergies between particle physics and gravitational waves
Published 2024-01-01“…Feynman integrals are essential for computing scattering amplitudes. Linear relations among these integrals, through Integral-By-Parts (IBP) identities, reduce them to a smaller set of independent integrals, known as master integrals (MIs). …”
Get full text
Article -
13325
Analysis of GPR Wave Propagation in Complex Underground Structures Using CUDA-Implemented Conformal FDTD Method
Published 2019-01-01“…However, the numerical accuracy and computational efficiency are not high because of the Courant-Friedrichs-Lewy (CFL) stability condition. …”
Get full text
Article -
13326
-
13327
-
13328
The Sandblaster Software-Defined Radio Platform for Mobile 4G Wireless Communications
Published 2009-01-01“…We present a tier 2 Software Defined-Radio platform (SDR), built around the latest Sandbridge Technologies' multithreaded Digital Signal Processor (DSP) SB3500, along with the description of major design steps taken to ensure the best radio link and computational performance. …”
Get full text
Article -
13329
An integration of ensemble deep learning with hybrid optimization approaches for effective underwater object detection and classification model
Published 2025-03-01“…Initially, the UODC-EDLHOA model involved several levels of pre-processing and noise removal to improve the clearness of the underwater images. …”
Get full text
Article -
13330
Continuous Arabic Sign Language Recognition Models
Published 2025-05-01“…The models are trained and evaluated using the created dataset of Arabic sign gestures based on recognition accuracy, processing speed, and robustness to variations in signing styles. …”
Get full text
Article -
13331
Constructing and analyzing algorithms of tensor operation paralleling
Published 2022-09-01“…It is assumed that the time of execution for all computing operations is same and equal to a unit of time, and data transfer between computer devices is performed instantaneously without any time consuming (it is acceptable, for example, a parallel computing systems with shared memory). …”
Get full text
Article -
13332
Long-propagating ghost phonon polaritons enabled by selective mode excitation
Published 2025-07-01Get full text
Article -
13333
Precision Target Spraying System Integrated with Remote Deep Learning Recognition Model for Cabbage Plant Centers
Published 2024-11-01“…The model operated on the Jetson Xavier NX controller, which was a high-performance, low-power computing platform designed for edge computing. The system was allowed to process complex tasks in real time directly in the field. …”
Get full text
Article -
13334
-
13335
-
13336
BIM Based Virtual Environment for Fire Emergency Evacuation
Published 2014-01-01“…BIM (building information modelling) can play a significant role in this process due to its comprehensive and standardized data format and integrated process. …”
Get full text
Article -
13337
Base4NFDI: Fostering A Cross-Disciplinary Service Landscape For The German National Research Data Infrastructure
Published 2025-08-01“…Through a proposal-driven, bottom-up process, Base4NFDI supports technical and organisational solutions, such as identity and access management, computing, software, and workflows that serve the NFDI community. …”
Get full text
Article -
13338
Investigating the diversity and stylization of contemporary user generated visual arts in the complexity entropy plane
Published 2025-07-01“…Abstract The advent of computational and numerical methods in recent times has provided new avenues for analyzing art historiographical narratives and tracing the evolution of art styles therein. …”
Get full text
Article -
13339
Orbit Space Information System (Sirubit) as Learning Media at PT Orbit Ventura Indonesia
Published 2025-07-01“…This leads to an ineffective learning process, as the instructional videos are shared separately through WhatsApp rather than integrated into a unified system. …”
Get full text
Article -
13340
Road-Adaptive Precise Path Tracking Based on Reinforcement Learning Method
Published 2025-07-01“…In addition, since the entire framework uses a lightweight network structure and a geometry-based method to generate the front wheel angle, the computational load is significantly reduced, and computing resources are saved. …”
Get full text
Article