Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
17281
-
17282
Enhanced Kidney Stone Detection and Classification Using SVM and LBP Features
Published 2025-01-01Get full text
Article -
17283
-
17284
Variational quantum algorithm for enhanced continuous variable optical phase sensing
Published 2025-05-01Get full text
Article -
17285
The Hessian by blocks for neural network by backward propagation
Published 2024-12-01“…This method uses the Hessian matrix to guide the optimization process but increases the computational cost at each iteration. …”
Get full text
Article -
17286
-
17287
-
17288
-
17289
-
17290
Next-to-next-to-leading order threshold soft function for tW production
Published 2025-05-01“…Our results provide a vital component for threshold resummation at the next-to-next-to-next-to-leading logarithmic level in this process.…”
Get full text
Article -
17291
Privacy protection of warning message publishing protocol in VANET
Published 2021-08-01“…Aiming at the problem that the traffic control department publishes violation messages to vehicles, a privacy protection warning message publishing protocol was proposed, where transportation manage department could obtain vehicle’s pseudonym according to its real identity and send warning message to vehicles based on its pseudonym in VANET.Elliptic curve cryptography was used to construct a lightweight warning message publishing and receiving process.Furthermore, the conditional privacy protection was realized, which could effectively protect the identity privacy of the receiving vehicle.Security analysis shows that the proposed protocol can meet the security requirements of VANET.Performance analysis shows that the protocol protocol has lower computational overhead and communication overhead.…”
Get full text
Article -
17292
Privacy protection of warning message publishing protocol in VANET
Published 2021-08-01“…Aiming at the problem that the traffic control department publishes violation messages to vehicles, a privacy protection warning message publishing protocol was proposed, where transportation manage department could obtain vehicle’s pseudonym according to its real identity and send warning message to vehicles based on its pseudonym in VANET.Elliptic curve cryptography was used to construct a lightweight warning message publishing and receiving process.Furthermore, the conditional privacy protection was realized, which could effectively protect the identity privacy of the receiving vehicle.Security analysis shows that the proposed protocol can meet the security requirements of VANET.Performance analysis shows that the protocol protocol has lower computational overhead and communication overhead.…”
Get full text
Article -
17293
Use of Artificial Neural Networks and Response Surface Methodology for Evaluating the Reliability Index of Steel Wind Towers
Published 2022-01-01“…The estimation of structural reliability is a process that requires a large number of computational hours when statistical data are not available since it is necessary to perform a large amount of analysis or numerical simulations to estimate parameters related to the reliability. …”
Get full text
Article -
17294
Lexicographically Maximum Contraflow Problem with Vertex Capacities
Published 2021-01-01“…A real dataset of Kathmandu road network with evacuation spaces is considered to implement the algorithm designed for dynamic multinetwork and to observe its computational performance.…”
Get full text
Article -
17295
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
Published 2019-02-01“…As a widely-applied public-key cryptosystem in TLS,SSL and IPSec protocols,the security of RSA cryptosystem is of great importance.At FDTC 2014,Rauzy and Guilley proposed several improved countermeasure algorithms of RSA implementation based on Chinese remainder theorem,which were used to defeat fault-injection attacks.New fault-injection attacks on two of their countermeasure algorithms are proposed.During the RSA computation process,a permanent fault is injected and then a faulty RSA signature result is induced.The RSA private key can be obtained by using the faulty RSA signature and the correct result.Therefore,Rauzy and Guilley’s two countermeasure algorithms cannot resist our fault-injection attack.…”
Get full text
Article -
17296
An extension of compromise ranking method with interval numbers for the evaluation of renewable energy sources
Published 2014-06-01“…Evaluating and prioritizing appropriate renewable energy sources is inevitably a complex decision process. Various information and conflicting attributes should be taken into account. …”
Get full text
Article -
17297
THE EFFECTIVE ROLE OF DIGITAL TECHNOLOGY IN ARABIC LANGUAGE EDUCATION
Published 2024-12-01“…Keywords: Digital technology, didactics, Arabic language, educational computer.…”
Get full text
Article -
17298
Composite Motion Design Procedure for Vibration Assisted Small-Hole EDM Using One Voice Coil Motor
Published 2016-01-01“…Particularly, for the purposes of high servo accuracy and high frequency response of the composite motion, an improved zero-phase-error tracking controller (ZPETC) algorithm decoupled with the feedback controller is developed for the process control, in which the feedback parameter adjustment is very simple to reduce the computation complexity. …”
Get full text
Article -
17299
Adaptive Fast Refocusing for Ship Targets With Complex Motion in SAR Images
Published 2025-01-01“…Compared to state-of-the-art leading refocusing algorithm, AFRA takes only approximately 15% the time required to process Hisea-1 data with long synthetic aperture time, 27% of the time required to process Gaofen-3 data with short synthetic aperture time, and still has excellent refocusing effect.…”
Get full text
Article -
17300
Investigating the Activities of <i>CAF20</i> and <i>ECM32</i> in the Regulation of <i>PGM2</i> mRNA Translation
Published 2024-10-01“…Translation is a fundamental process in biology, and understanding its mechanisms is crucial to comprehending cellular functions and diseases. …”
Get full text
Article