Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 4
- Business 3
- Computer programs 3
- Information technology 3
- Management 3
- Internet in public administration 2
- Management information systems 2
- Photography 2
- Public administration 2
- Advertising media planning 1
- Anxiety Disorders 1
- Automatic speech recognition 1
- Bioinformatics 1
- Biological and Medical Physics, Biophysics 1
- Biological physics 1
- Biomathematics 1
- Biophysics 1
- Business intelligence 1
- COMPUTERS / Desktop Applications / Suites 1
- Certification 1
- Children 1
- Cloud computing 1
- Cognitive Therapy 1
- Commercial statistics 1
- Computer graphics 1
- Computer networks 1
- Computer simulation 1
- Computer systems 1
- Computer-aided design 1
- Design 1
-
13321
-
13322
Enhancing Speed and Imperceptibility in Watermarking Systems by Leveraging Galois Field Tables
Published 2024-01-01“…GF tables are used to increase computing effectiveness and enable real-time processing, whereas irreducible polynomials are selected to maximize imperceptibility. …”
Get full text
Article -
13323
Research on Reservoir History Matching Method Based on Real⁃Coded Genetic Algorithm and Connectivity Model
Published 2025-06-01“…As gradient⁃based methods face challenges in computing the gradient of the objective function, intelligent optimization algorithms with stochastic properties are widely applied in reservoir optimization processes. …”
Get full text
Article -
13324
METHODOLOGICAL APPROACHES TO CREATION OF THE RISK MANAGEMENT SUBSYSTEM IN A CONTROL SYSTEM OF THE INTEGRATED INDUSTRIAL COMPANY
Published 2017-02-01“…The subject of the research is a process of creation of the risk management subsystem in a control system of the integrated industrial company. …”
Get full text
Article -
13325
NUMERICAL SIMULATION OF METHANE EMISSION FROM SUBARCTIC LAKE IN KOMI REPUBLIC (RUSSIA)
Published 2016-06-01Get full text
Article -
13326
Neuromorphic Hebbian learning with magnetic tunnel junction synapses
Published 2025-08-01“…Abstract Neuromorphic computing aims to mimic both the function and structure of biological neural networks to provide artificial intelligence with extreme efficiency. …”
Get full text
Article -
13327
Tectonic depressions on the East-European and Siberian platforms: numerical modeling of convection beneath the Eurasian continent
Published 2021-03-01“…Mathematical modeling is a basic method for studying convective processes in the mantle. Our paper presents a numerical model of convection, which is based on the implicit artificial compressibility method. …”
Get full text
Article -
13328
Optimized framework for magnetohydrodynamic Darcy–Forchheimer flow of Reiner–Philippoff fluid incorporating homogeneous–heterogeneous reactions with radiative heat transfer and Cat...
Published 2025-10-01“…The findings point to a new function for nuclear reactors, chemical processes, electronic cooling, microheater pipes, and heat transfer phenomena.…”
Get full text
Article -
13329
-
13330
Harnessing bioenergy for sustainable and balanced energy generation in Nigeria
Published 2025-04-01Get full text
Article -
13331
Identifying and understanding the nonlinear behavior of memristive devices
Published 2024-12-01“…Abstract Nonlinearity is a crucial characteristic for implementing hardware security primitives or neuromorphic computing systems. The main feature of all memristive devices is this nonlinear behavior observed in their current-voltage characteristics. …”
Get full text
Article -
13332
Is It Really a Paradox? A Mixed-Methods, Within-Country Analysis of the Gender Gap in STEM Education
Published 2025-04-01“…Findings support arguments positing gender-specific effects of postmaterialist, individualistic value systems, and suggest that the cultural and organizational processes that generate larger gender gaps in more affluent countries may also play out within countries.…”
Get full text
Article -
13333
A Program for Master of Information Technology
Published 2022“…The Master of Information Technology (MIT) mainly deals with the Management of Information Technology focusing on a number of areas including but not limited to business process management, e-services, computer security, technology modeling and data management. …”
Get full text
Other -
13334
-
13335
An Efficient Confidentiality and Integrity Preserving Aggregation Protocol in Wireless Sensor Networks
Published 2014-02-01Get full text
Article -
13336
A Compact Wideband Printed Antenna for 4G/5G/WLAN Wireless Applications
Published 2019-01-01Get full text
Article -
13337
Frequency modulation on magnons in synthetic dimensions
Published 2025-04-01“…Abstract Magnons are promising candidates for next-generation computing architectures, offering the ability to manipulate their amplitude and phase for information encoding. …”
Get full text
Article -
13338
Securable networked scheme with face authentication
Published 2022-03-01“…Wide applications are associated with a large amount of data transmission so that edge computing is inspired accordingly. In this research task, the major goal of edge computing is to handover a part of the computing work to the terminal equipment; the server only needs to process the results of final return. …”
Get full text
Article -
13339
-
13340
Performance Estimation of Low Power and Area-Efficient Parallel Pipelined FFT
Published 2025-06-01“…We present a novel parallel and pipelined fast Fourier transform (FFT) architecture for high-speed and low-power applications, a critical component in wireless communications and digital signal processors. The new FFT model implements a data-inverted Vedic multiplier in the FFT architecture, which reduces data switching activity in the input patterns to minimize dynamic power consumption and computational delay. …”
Get full text
Article