Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
26041
-
26042
Exploring the Quantity Change Pattern of Environment-Friendly Products in the Sharing Economy
Published 2021-01-01Get full text
Article -
26043
-
26044
Design and analysis of innovative multi-frequency ultrasonic probe characteristics
Published 2025-07-01Get full text
Article -
26045
RANKING FACTORS FOR SUPPLIER SELECTION WITH APPLICATION OF THE FTOPSIS METHOD
Published 2017-05-01Get full text
Article -
26046
Removing Scattered Light in Biomedical Images via Total Variation Guided Filter
Published 2025-01-01“…Second, although some neural network methods can remove the scattered light in biomedical images, they contain a large number of parameters, hampering their training process and the deployment in practical applications. …”
Get full text
Article -
26047
Study of elastic scattering of protons on 7Li in the energy range of 3–5.3 MeV
Published 2025-06-01“…The results demonstrate that the Full-Wave Method provides a physically consistent description of the elastic scattering process and offers a solid foundation for further theoretical refinement and experimental validation in light nuclear systems. …”
Get full text
Article -
26048
Online electric network capacity assesment
Published 2020-09-01“…Reliability of power supply to consumers and the efficient use of energy resources are priority tasks in the process of operational dispatch control of the energy system. …”
Get full text
Article -
26049
Improvement of metaphor understanding via a cognitive linguistic model based on hierarchical classification and artificial intelligence SVM
Published 2025-05-01“…Abstract This study aims to enhance computers’ ability to understand and generate metaphors, offering a novel perspective and technical approach in the field of natural language processing. …”
Get full text
Article -
26050
Gaussian Pulse-Based Two-Threshold Parallel Scaling Tone Reservation for PAPR Reduction of OFDM Signals
Published 2011-01-01“…However conventional TR suffers from high computational cost due to the difficulties in finding an effective cancellation signal in the time domain by using only a few tones in the frequency domain. …”
Get full text
Article -
26051
Modelling combustion reactions for gas flaring and its resulting emissions
Published 2016-07-01“…Flaring of gas maybe a very efficient combustion process especially steam/air assisted flare and more economical than utilization in some oil fields. …”
Get full text
Article -
26052
Evaluating Google Maps’ Eco-Routes: A Metaheuristic-Driven Microsimulation Approach
Published 2024-11-01“…Employing microsimulation modelling and a computer-generated mirror of a small traffic network, the study integrates real-world traffic patterns to enhance accuracy. …”
Get full text
Article -
26053
Quantitative Safety Analysis of Train Control System Considering Common Cause Failure
Published 2024-02-01“…The article takes the computer interlocking system as the research object, and the quantitative calculation results indicated a reduced impact of common cause failures with a smaller factor. …”
Get full text
Article -
26054
Which scapula fractures should we operate on and what are the functional outcomes?
Published 2023-10-01“…Radiologic examination (AP in the scapular plane, lateral and axillary radiography) and computed tomography (CT) scans were performed in all patients. …”
Get full text
Article -
26055
Mapping the Location and Infrastructure of Slum Settlement Areas in Palembang City Using Mobile-Based GIS
Published 2025-03-01“…GIS is an organized collection of computer hardware, software, geographic data and personnel designed to efficiently acquire, store, update and display all forms of geographically referenced information. …”
Get full text
Article -
26056
DC-YOLO: an improved field plant detection algorithm based on YOLOv7-tiny
Published 2024-11-01“…In addition, we introduce the Content-Aware ReAssembly of FEatures (CARAFE) operator to represent the up-sampling process as a learnable feature reorganization, which enriches the feature information of the sampled images. …”
Get full text
Article -
26057
An Adapted Ant Colony Optimization for Feature Selection
Published 2024-12-01“…This wealth of high-dimensional data presents challenges, including increased computational demands and difficulties in extracting valuable insights. …”
Get full text
Article -
26058
Innovation dans un projet de télécollaboration orale en intercompréhension : bilan et perspectives du projet IOTT
Published 2020-12-01“…It also points to the learning potential of plurilingual computer mediated synchronous communication across two different disciplines: an intercomprehension program and a foreign language teaching methodology course. …”
Get full text
Article -
26059
Status and Challenges of the National Service Training Program and Its Impact on Values Formation
Published 2017-01-01“…Frequency, percentage, mean and standard deviation were used a descriptive statistics and Man-Whitney U Test and Kruskal-Wallis H Test at 0.05 alpha were employed as inferential statistics. All statistical computations were processed through the Statistical Package for Social Sciences (SPSS) software. …”
Get full text
Article -
26060
Functional Message Authentication Codes With Message and Function Privacy
Published 2024-01-01“…Except the unforgeability, we require the proposed functional MAC to satisfy function and message privacy which indicates that the authenticating process reveals nothing other than the function values and the corresponding tags. …”
Get full text
Article