Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
17561
Seismic Response Analysis Method of Damping Structures Based on the Inter-history Iteration and Secondary Development of ABAQUS
Published 2025-05-01“…The seismic response analysis of damped structures is performed using ABAQUS, eliminating the need for a complex numerical integration method. 2) Efficiency of the iterative process. Unlike the extensive computational steps required by the numerical integration method, the inter-history iterative method achieves strong convergence with only a few iterations. 3) Nonlinear problem avoidance. …”
Get full text
Article -
17562
Sosialisasi Implementasi ABSS (Asian Business Software Solution) Accounting v.27 di SMAN 4 Padang
Published 2023-12-01“…The implementation and use of computer accounting is not only limited to technical aspects but also requires an effective socialization process to ensure acceptance and proper use by users. …”
Get full text
Article -
17563
基于模糊多级综合评判的齿轮故障危害度分析
Published 2013-01-01“…In the analysis of transmission gear fault mode,the occurrence probability of fault,serious degree and maintain ability of failure are considered.And the weight of fault factors is obtained based on experience data and AHP(Analytic Herarchy Process)method.The quantitative analysis of the gear fault criticality is realized through the fuzzy mathematics method.Furthermore,the criticality weight of the failure mode is computed by using Delphi method based on expert inquiry,then the influence of gear fault on higher-up transmission parts is obtained.The results of comparing with Risk Priority Number(RPN)method and criticality matrix diagram method show that,the result of quantitative analysis can be obtained by using fuzzy multilevel comprehensive evaluation,the otherness result can be more acquired on the basis of considering a variety of fault factors,and the support for the fault criticality evaluation is provided.Through the analysis of influence of criticality on higher-up transmission parts,the basis for overall design index distribution is provided.…”
Get full text
Article -
17564
APPLICATION DEVELOPMENT OF AUGMENTED REALITY FOR ELEMENTARY ENGLISH TEACHING
Published 2023-01-01“…Keywords: Augmented Reality; elementary school; English teaching process.…”
Get full text
Article -
17565
Risk Assessment of Steel Structure Engineering Cost using Multi-Criteria Decision-Making Approach under Uncertainty
Published 2025-04-01“…This study proposes multi-criteria decision making (MCDM) method to compute the criteria weights are rank the alternatives. …”
Get full text
Article -
17566
Solution of Fractional Partial Differential Equations Using Fractional Power Series Method
Published 2021-01-01“…How to paradigm an initial representation plays an important role in the subsequent process, and a few examples are provided to clarify the initial solution collection.…”
Get full text
Article -
17567
Self-Tuning Control with Regularized RLS Algorithm for Vibration Cancellation of a Circular Plate
Published 2014-09-01“…The self-tuning control assumes that the vibrating system is unknown and the controller procedure has the ability to identify the process and to update the necessary control law. …”
Get full text
Article -
17568
Privacy matching-based service proxy discovery scheme
Published 2016-08-01“…According to user's requirements on the proxy performance,cost and safety in proxy discovery,and the pri-vacy-preserving issue during the process of the demand private matching,a new private matching algorithm was pre-sented based on Paillier homomorphic encryption,comprehensively considered the attributes of user and agents and their priority.It included four steps:building the similarity function based on Euclidean distance,carrying on the private matching by encryption algorithm,calculating the similarity and screening the proxy chain.Proposed scheme introduced semi trusted primary proxy from the global level,which is to manage all the sub proxy's business type and the connection status,and do the main computational overhead.At the same time,Euclidean distance and Paillier homomorphic encryp-tion algorithm were combined to support the multivariate attributes with priority to match,which can effectively protect the privacy of user and sub proxy.Finally,security analysis and evaluation results show the effectiveness and safety of proposed scheme.…”
Get full text
Article -
17569
THE MECHANISM OF DIGITAL TRANSFORMATION OF AGRIBUSINESS IN RUSSIA
Published 2022-01-01“…Research methods: monographic, logical, abstract-logical, computational-constructive, statistical-economic and comparative analysis. …”
Get full text
Article -
17570
A Calculation Method for Axle Load and Wheel Weight Analysis of 100% Low Floor for Suspended-modular Tram
Published 2020-05-01“…The results showed that the calculation method was reasonable and effective, and could be applied to the weight management of 100% low floor tram design process.…”
Get full text
Article -
17571
Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles
Published 2014-02-01“…The approach is to embed information into beacon messages either in the signature process (subliminal channel) or altering the least significant bits of selected sensorial fields (steganography). …”
Get full text
Article -
17572
Efficient pseudonym certificate distribution scheme for Internet of vehicles based on novel sanitizable multi-signature
Published 2024-11-01“…Security analysis shows that the scheme effectively resists correlation and impersonation attacks, with minimal computational overhead on RSU and vehicles, ensuring good efficiency and security during pseudonym certificate and anonymous authentication processes.…”
Get full text
Article -
17573
A Data Collection Application for Geosciences Professionals
Published 2018-07-01“…<p>This article presents the process of elaborating a web platform that allows the georeferenced data collection in the Twitter API. …”
Get full text
Article -
17574
Novel virtual screening approach for the discovery of human tyrosinase inhibitors.
Published 2014-01-01“…Tyrosinase is the key enzyme involved in the human pigmentation process, as well as the undesired browning of fruits and vegetables. …”
Get full text
Article -
17575
-
17576
Topology for gaze analyses - Raw data segmentation
Published 2017-03-01“…Recent years have witnessed a remarkable growth in the way mathematics, informatics, and computer science can process data. In disciplines such as machine learning, pattern recognition, computer vision, computational neurology, molecular biology, information retrieval, etc., many new methods have been developed to cope with the ever increasing amount and complexity of the data. …”
Get full text
Article -
17577
Design of an improved model using federated learning and LSTM autoencoders for secure and transparent blockchain network transactions
Published 2025-01-01“…In homomorphic encryption, computations are made in the encrypted form so when forming privacy preserving global model, privacy is preserved. …”
Get full text
Article -
17578
Thermal state of ventilated concrete cask with spent nuclear fuel in the conditions of exterior airflow leaking
Published 2009-06-01“…The process of heat-and-mass transfer in the ventilated concrete container used for prolonged intermediate storage of sealed cask with spent fuel rods is investigated by computer modelling in conditions of exterior airflow leaking. …”
Get full text
Article -
17579
Particles in finite volumes and a toy model of decaying neutrons
Published 2025-07-01“…In this article, we consider real scalar particles confined to finite volumes with periodic boundary conditions, such that the particles’ spectra are discrete. We directly compute the density matrices describing the decay processes $$\phi \rightarrow \varphi ^2$$ ϕ → φ 2 and $$\phi \rightarrow \varphi \chi \nu $$ ϕ → φ χ ν , and subsequently derive expressions for the decay probabilities both for confined and unconfined particles. …”
Get full text
Article -
17580
Kunstgeschichte der digitalen Bilder
Published 2018-06-01“…This essay explores how medial innovations influence the perception of the past and characterise this process as a feedback phenomenon. …”
Get full text
Article