Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
17801
Neural tuning instantiates prior expectations in the human visual system
Published 2023-09-01“…Abstract Perception is often modelled as a process of active inference, whereby prior expectations are combined with noisy sensory measurements to estimate the structure of the world. …”
Get full text
Article -
17802
Modelling and Testing the Dynamic Properties of a Launcher with Unguided Missiles
Published 2022-12-01“…Unguided NLPR-70 missiles were launched. The launching process was recorded using a Phantom high-speed digital camera. …”
Get full text
Article -
17803
Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user
Published 2019-02-01“…The traditional privacy-preserving image retrieval schemes not only bring large computational and communication overhead,but also cannot protect the image and query privacy in multi-user scenarios.To solve above problems,an efficient privacy-preserving content-based image retrieval scheme was proposed in multi-user scenarios.The scheme used Euclidean distance comparison technique to rank the pictures according to similarity of picture feature vectors and return top-k returned.Meanwhile,the efficient key conversion protocol designed in proposed image retrieval scheme allowed each search user to generate queries based on his own private key so that he can retrieval encrypted images generated by different data owners.Strict security analysis shows that the user privacy and cloud data security can be well protected during the image retrieval process,and the performance analysis using real-world dataset shows that the proposed image retrieval scheme is efficient and feasible in practical applications.…”
Get full text
Article -
17804
Adaptive Terminal Sliding Mode Fault-Tolerant Control of Spacecraft Based on the Left Attitude Error Function of SO(3)
Published 2023-01-01“…The controller designed based on the left attitude error description system of SO(3) has the features of small computational effort and simple design process. Finally, the numerical simulation of the attitude tracking error verifies the feasibility and high efficiency of the controller designed in this paper.…”
Get full text
Article -
17805
Study on the Flow and Acoustic Field of an Electronic Expansion Valve under Refrigeration Condition with Phase Change
Published 2022-01-01“…There are high pressure gradient and velocity gradient in the flow field, and it also involves the process of flashing phase change, physical property change, and heat transfer, which is difficult to simulate directly. …”
Get full text
Article -
17806
Modeling of Particle Trajectory and Erosion of Large Rotor Blades
Published 2016-01-01Get full text
Article -
17807
TECHNOLOGY OF MANUFACTURING OF TRANSISTOR STRUCTURES POWER ELECTRONICS
Published 2016-07-01“…Optimised process stages of the transistor structure formation have been proposed. …”
Get full text
Article -
17808
Robotic Cell Layout Optimization Using a Genetic Algorithm
Published 2024-09-01“…This article suggests using an evolutionary computation algorithm (genetic algorithm) as a tool to solve this optimization problem. …”
Get full text
Article -
17809
Deep Web new data discovery strategy based on the graph model of data attribute value lists
Published 2016-03-01“…A novel deep Web data discovery strategy was proposed for new generated data record in resources.In the ap-proach,a new graph model of deep Web data attribute value lists was used to indicate the deep Web data source,an new data crawling task was transformed into a graph traversal process.This model was only related to the data,compared with the ex-isting query-related graph model had better adaptability and certainty,applicable to contain only a simple query interface of deep Web data sources.Based on this model,which could discovery incremental nodes and predict new data mutual infor-mation was used to compute the dependencies between nodes.When the query selects,as much as possible to reduce the negative impact brought by the query-dependent.This strategy improves the data crawling efficiency.Experimental results show that this strategy could maximize the synchronization between local and remote data under the same restriction.…”
Get full text
Article -
17810
Применение искусственного интеллекта для оптимизации рутинных административных задач: возможности, проблемы и перспективы...
Published 2024-12-01“…Artificial intelligence (AI) is a field of computer science aimed at creating systems to perform tasks that require intellectual abilities. …”
Get full text
Article -
17811
A Novel Ranking Method for Trapezoidal Fuzzy Soft Sets and Applications in Multicriteria Decision-Making
Published 2025-01-01“…They have a major influence on the decision-making process. Hence, the ranking of fuzzy numbers become more significant in solving such problems. …”
Get full text
Article -
17812
Web services composition algorithm based on the location of backup service and probabilistic QoS model
Published 2016-10-01“…In the process of increasing the number of work-flow services, as the potential cost of the initial planning is high, and the reliability of many service composition algorithms is not enough. …”
Get full text
Article -
17813
Influence of Water Content on the Mechanical Characteristics of Mudstone with High Smectite Content
Published 2022-01-01“…In this study, the water absorption characteristics of mudstone were obtained by a computer-automated WA (water absorption) equipment system experiments. …”
Get full text
Article -
17814
Sinkhole attack detection based on fusion of ACO and P2P trust model in WSN
Published 2016-04-01“…Finally,P2P trust model was used to compute trust value of each suspicious node,and the node with trust value was lower than the preset threshold as invasion of node. …”
Get full text
Article -
17815
A Grammar of Muqarnas: Drawings of the Alhambra by Jones and Goury (1834-1845)
Published 2019-10-01“…After consideration of a few questions regarding the process of data collection in Granada, a comparative analysis is presented of a cornice, a capital, an arch and a pendentive, with photos and computer-aided drawings. …”
Get full text
Article -
17816
The Impact of AI Use in Programming Courses on Critical Thinking Skills
Published 2025-04-01“…Proficiency in computer programming extends far beyond memorizing syntax; it depends on the cultivation of critical thinking. …”
Get full text
Article -
17817
Transferable polychromatic optical encoder for neural networks
Published 2025-07-01“…However, these neural networks for image processing demand substantial computational resources, often hindering real-time operation. …”
Get full text
Article -
17818
Traffic signal active control method for short-distance intersections.
Published 2025-01-01“…Aiming at the existing problems about the overflow prevention goal and the overall traffic efficiency guarantee being difficult to optimize at the same time in the signal control process of short-distance intersections scenario, this paper proposes a traffic signal active control method based on key state prediction. …”
Get full text
Article -
17819
A scalable parallel sorting algorithm by regular sampling for big data
Published 2024-07-01“…Sorting is one of the basic algorithms in computer science, and has been extensively used in a variety of applications.In the big data era, as the volumes of data increase rapidly, parallel sorting has attracted much attention.Existing parallel sorting algorithms suffered from excessive communication overhead and load imbalance, making it difficult to scale massively.To solve above problems, a scalable parallel algorithm sorting by regular sampling (ScaPSRS) was proposed, which sampled the p-1 pivot elements to divide the entire data set into p disjoint subsets by all parallel processes, rather than by only one given process as PSRS did.Furthermore, ScaPSRS adopted a novel iterative update strategy of selecting pivots to guarantee that the workloads and data were evenly scheduled among the parallel processes, thus ensuring superior overall performance.A variety of experiments conducted on the Tianhe-Ⅱ supercomputer demonstrated that ScaPSRS succeeded in scaling to 32 000 cores and outperformed state-of-the-art works significantly.…”
Get full text
Article -
17820
Suspended sand transport in different conditions of temperature and salinity
Published 2005-10-01“…When temperature increases or salinity decreases, the settling process of particles occurs faster. For fine sand, the discrepancy on transport rates due to temperature or salinity decreases with wave height. …”
Get full text
Article